Depuis 2004, Janua vous accompagne dans toutes les étapes de vos projets de gestion des identités et open source, de sécurité et de mise en œuvre de logiciels libres.

Nos domaines d’expertise :
  • Gestion des Identités et Open Source
  • Nos prestations : audit, consulting, intégration, accompagnement à la mise en production, benchmarks et support.
  • Notre approche : les processus itératifs, les maquettes (POC) et l’utilisation de méthodes « agiles ».
Nos principaux domaines d’interventions techniques :

Gestion des identités

Identity & Access Management

La gestion des identités et des accès (Identity and Access Management) est devenue …

Les annuaires LDAP

Lightweight Directory Access Protocol (LDAP) est le protocole d’accès privilégié …

SAML, OpenID & Fédération

Security assertion markup language (SAML) et OpenID Connect (OIDC) sont des standards …

La sécurité de l'IOT

La sécurité de l’IoT (Internet des Objets): Les études de la société Gartner prédisent …

Single Sign On - SSO

L’authentification unique, en anglais Single Sign-On ou SSO, est une technique …

Provisioning d'identités

La multiplication des référentiels d’identité au sein des entreprises (AD, LDAP, Oracle …

Services

Support & Expertise OpenDJ

Offre de support OpenDJ et WrenDS complète…

Intégration & Expertise RedHat SSO

Support, intégration et expertise RedHat SSO et Keycloak complète…

Support & Expertise OpenAM

Offre de support OpenIG, OpenAM et WrenAM complète …

Intégration & Expertise RedHat DS

Support, intégration et expertise RedHat DS et 389 DS complète…

Support & Expertise OpenIDM

Offre de support OpenIDM et WrenIDM complète …

Outillage LDAP & SSO

Les annuaires LDAP et les infrastructures de SSO prennent….

EDITION - OPEN SOURCE

Jaguards

logiciel de main courante informatisée et gestion de crise pour SDIS, Aéroports …

CMakeBuilder

CMakeBuilder est un plugin Eclipse qui vous permet de créer ou maintenir des projets …

LdapTools

Les consultants de Janua cumulent de nombreuses années de pratique …

TECHNICAL BLOG

SunOne DS to RedHat DS migration with different charset

1) Presentation When making a SunOne DS to RedHat-DS migration with different charset: Redhat DS is using UTF-8 charset. It means ldif import files used by RH-DS have to be  UTF-8. This is even more true, when it comes to binary data, which ought to be encoded using...

Multi Factor Authentication with Keycloak

In this article, we will try to  synthesize about Multi Factor Authentication with Keycloak and RedHat SSO. Presentation MFA stands For multi-factor authentication. Usual authentication with username/password is one of the weakest authentication scheme possible, which...

Keycloak Multifactor authentication (MFA) using OTP

In this article, we will demo how to parameter Keycloak Multifactor authentication (MFA) using OTP Presentation It is possible to configure Keycloak MFA almost out of the box. In the following is demoed how to enable keycloak MFA using freeOTP. Demo_otp realm Let’s...

Using Eclipse to debug Keycloak SPIs

In this section is presented how to using eclipse to debug Keycloak SPI code. The example used is the eventListener described in a previous article. Requirements You need to have eclipse installed You need to have compiled the keycloak source distribution (cf before)...

Keycloak SPI adding a custom event listener module

In this article, we will share how to parameter RedHat SSO Keycloak SPI  adding a custom Event Listener module 1. Presentation The goal of this article is to showcase the usage of SPI usage with keycloak. For this, it is illustrated with a very simple SPI example...

Securing apps and services with Keycloak

Securing apps and services with Keycloak: a great video, thanks to Redhat developpers ! If you have a number of applications and services, the applications may be HTML5, server-side, or mobile, while the services may be monolithic or microservices, deployed...

Architectural principles with Keycloak-Redhat SSO

1. Presentation: Architectural principles with Keycloak Redhat SSO The goal of this paper is to present how it is possible to architect a SSO-LDAP-Identity Manager infrastructure with Keycloak-Redhat SSO. Keycloak-RedHatSSO allows to register applications which...

Using Keycloak/RH-SSO in a microservice SAAS architecture

This paper describes how  to leverage  Keycloak/RH-SSO in a microservice SAAS Architecture. 1) SAAS: Software as a Service with KeyCloak All Saas Applications are registered within keycloak as client service using confidential mode. A Saas application can be...

Howto Docker with Keycloak – examples

Howto Docker with Keycloak : In this article Janua's CTO share tips and tricks about intégrating KeyCloak with Docker. 1) Overview The goal of this article is to showcase how it is possible to deploy very quickly keycloak examples with docker. 2) Requirements You need...

Migrating from ODSEE to OpenDJ-WrenDS

Oracle has announced that ODSEE shall be EOLed in 2019. Why not considering Migrating from ODSEE to OpenDJ-WrenDS. According to Oracle roadmap, ODSEE replacement is OUD (Oracle Unified Directory). But do you know that OUD and OpenDJ both originates from Sun OpenDS...