Depuis 2004, Janua vous accompagne dans toutes les étapes de vos projets de gestion des identités et open source, de sécurité et de mise en œuvre de logiciels libres.

Nos domaines d’expertise :
Nos principaux domaines d’interventions techniques :

Gestion des identités

Identity & Access Management

La gestion des identités et des accès (Identity and Access Management) est devenue …

Les annuaires LDAP

Lightweight Directory Access Protocol (LDAP) est le protocole d’accès privilégié …

SAML & Fédération d'identités

Security assertion markup language (SAML) est un standard définissant un protocole …

La sécurité de l'IOT

La sécurité de l’IoT (Internet des Objets): Les études de la société Gartner prédisent …

Provisioning

La multiplication des référentiels d’identité au sein des entreprises (AD, LDAP, Oracle …

Services

Support & Expertise OpenDJ

Offre de support OpenDJ et WrenDS complète…

Intégration & Expertise RedHat SSO

Support, intégration et expertise RedHat SSO et Keycloak complète…

Support & Expertise OpenAM

Offre de support OpenIG, OpenAM et WrenAM complète …

Support & Expertise OpenIDM

Offre de support OpenIDM et WrenIDM complète …

Outillage LDAP & SSO

Les annuaires LDAP et les infrastructures de SSO prennent….

EDITION - OPEN SOURCE

Jaguards

logiciel de main courante informatisée et gestion de crise pour SDIS, Aéroports …

CMakeBuilder

CMakeBuilder est un plugin Eclipse qui vous permet de créer ou maintenir des projets …

LdapTools

Les consultants de Janua cumulent de nombreuses années de pratique …

TECHNICAL BLOG

Securing apps and services with Keycloak

Securing apps and services with Keycloak: a great video, thanks to Redhat developpers ! If you have a number of applications and services, the applications may be HTML5, server-side, or mobile, while the services may be monolithic or microservices, deployed...

Architectural principles with Keycloak-Redhat SSO

1. Presentation: Architectural principles with Keycloak Redhat SSO The goal of this paper is to present how it is possible to architect a SSO-LDAP-Identity Manager infrastructure with Keycloak-Redhat SSO. Keycloak-RedHatSSO allows to register applications which...

Using Keycloak/RH-SSO in a microservice SAAS architecture

This paper describes how  to leverage  Keycloak/RH-SSO in a microservice SAAS Architecture. 1) SAAS: Software as a Service with KeyCloak All Saas Applications are registered within keycloak as client service using confidential mode. A Saas application can be...

Howto Docker with Keycloak – examples

Howto Docker with Keycloak : In this article Janua's CTO share tips and tricks about intégrating KeyCloak with Docker. 1) Overview The goal of this article is to showcase how it is possible to deploy very quickly keycloak examples with docker. 2) Requirements You need...

Migrating from ODSEE to OpenDJ-WrenDS

Oracle has announced that ODSEE shall be EOLed in 2019. Why not considering Migrating from ODSEE to OpenDJ-WrenDS. According to Oracle roadmap, ODSEE replacement is OUD (Oracle Unified Directory). But do you know that OUD and OpenDJ both originates from Sun OpenDS...

OpenID: understanding JWT and signed JWT usage with RedHat SSO Keycloak

Janua's CTO sharing tips and tricks about OpenID and understanding JWT and signed JWT usage with RedHat SSO Keycloak 1) JWT token presentation JWT token representation is described in RFC 7519 https://tools.ietf.org/html/rfc7519 A JWT token is made up of 3 parts ,...

Understanding oauth2 bearer token usage with RedHat SSO Keycloak

In this article we will share with you our understanding of oauth2 bearer token usage with RedHat SSO Keycloak. 1. Overview  Access Token are defined by RFC 6750, and are of type Bearer Token. Access Tokens are used to access to the content of a resource according to...

Understand the difference between client ID-Client secret and signed JWT authentication Scheme in RedHat SSO

In this article we will try to understand the difference between client ID-Client secret and signed JWT authentication Scheme in RedHat SSO (aka Keycloak). 1) Presentation When dealing with Oauth2/openID RH-SSO provides 3 possible  authentication schemes which are:...

Using Keycloak Authz examples with RedHat SSO (Authorization Service)

1) Overview This article explains how to use the the keycloak Authz examples with Redhat SSO. 2) RH-SSO server Examples are by default provided on a a jboss server at address 8080. RH-SSO needs some parameter customization to be launched It is required to launch...

Understanding Authorisation Services with Redhat SSO

1) Overview Understanding Authorisation Services with Redhat SSO : Authorisation Services is a major key component of an Identity and Access Management Solution. It allows to define the resources and scopes a user is entitled to (i.e. permission). Like this is...