Depuis 2004, Janua vous accompagne dans toutes les étapes de vos projets de gestion des identités et open source, de sécurité et de mise en œuvre de logiciels libres.

Nos domaines d’expertise :
  • Gestion des Identités et Open Source
  • Nos prestations : audit, consulting, intégration, accompagnement à la mise en production, benchmarks et support.
  • Notre approche : les processus itératifs, les maquettes (POC) et l’utilisation de méthodes « agiles ».
Nos principaux domaines d’interventions techniques :

Gestion des identités

Identity & Access Management

La gestion des identités et des accès (Identity and Access Management) est devenue …

Les annuaires LDAP

Lightweight Directory Access Protocol (LDAP) est le protocole d’accès privilégié …

SAML, OpenID & Fédération

Security assertion markup language (SAML) et OpenID Connect (OIDC) sont des standards …

La sécurité de l'IOT

La sécurité de l’IoT (Internet des Objets): Les études de la société Gartner prédisent …

Single Sign On - SSO

L’authentification unique, en anglais Single Sign-On ou SSO, est une technique …

Provisioning d'identités

La multiplication des référentiels d’identité au sein des entreprises (AD, LDAP, Oracle …

Services

Support & Expertise OpenDJ

Offre de support OpenDJ et WrenDS

Intégration & Expertise RedHat SSO

Support, intégration et expertise RedHat SSO et Keycloak

Support & Expertise OpenAM

Offre de support OpenIG, OpenAM et WrenAM

Intégration & Expertise RedHat DS

Support, intégration et expertise RedHat DS et 389 DS

Support & Expertise OpenIDM

Offre de support OpenIDM et WrenIDM

Outillage LDAP & SSO

Les annuaires LDAP et les infrastructures de SSO prennent….

EDITION - OPEN SOURCE

Jaguards

logiciel de main courante informatisée et gestion de crise pour SDIS, Aéroports …

CMakeBuilder

CMakeBuilder est un plugin Eclipse qui vous permet de créer ou maintenir des projets …

LdapTools

Les consultants de Janua cumulent de nombreuses années de pratique …

TECHNICAL BLOG

How to install KeyCloak with MariaDB

1) Presentation This chapter illustrates how to install Keycloak with MariaDB database and how it is possible to configure MariaDB with KeyCloak. The version used are: keycloak is 6.01 mariadb is 10.3 This done throughout the following steps : (1)...

Keycloak Access Token verification example

This article describes how it is possible to validate a Keyloak access token and performing signature verification. The RSA realm public key is uploaded in order to verify the access token signature The example is illustrated using jwt.io debugger debugger, but could...

Understanding UMA and Keycloak

In this article, we will try to understand and demistify UMA and Keycloak. UMA is quit new and we will try to understand the new paradigms, use cases and demonstrate its implementation within Keycloak. 1 Presentation – What is UMA ? UMA stands for User Management...

Understanding Password Policy with Keycloak and LDAP

Understanding Password Policy with Keycloak and LDAP : both Keycloak and LDAP servers provide password policy support. This article discusses keycloak and Ldap password policies and what is the best route to choose when performing Keycloak/LDAP integration. The end...

Understanding Keycloak RedHat SSO Authentication

In this article, we will share tips and tricks about understanding Keycloak RedHat SSO Authentication mecanisms. 1 Presentation For each realm, it it is possible to configure Authentication. There is on the left hand-side an Authentication TAB, that the user can...

Using apache2 mod_auth_openidc module with Keycloak (OpenID Connect)

In this article, we will share how to using apache2 mod_auth_openidc module with Keycloak (OpenID Connect) 1) Presentation The usage of the apache2 mod_auth_openidc module is to act as RP (Relying Party) when discussing with OP (OpenID connect Provider). The apache2...

Protecting Keycloak RedHat SSO with a Reverse Proxy

In this article are exposed some of the key concepts protecting a Keycloak RedHat SSO with a reverse proxy in production. Protecting the keycloak server is crucial. Keycloak server should not be visible from the outside 1) Why adding a reverse proxy The goal of the...

Understanding keycloak user Federation

In this article, Janua's CTO shares tips and tricks about understanding Keycloak user Federation 1 Understanding Keycloak user Federation 1.1 Overview Keycloak comes up with a user storage SPI. By default Keycloak comes with 3 different user storage federation...

Examples of offline token usage in Keycloak

In this article we share examples of offline token usage in Keycloak. As mentioned previously, it is possible to generate offline either through direct access grant or authorization code flow. Both way are going to be illustrated in this chapter Using offline Token...

Understanding token usage in Keycloak

In this article Janua's CTO shares tips and tricks about understanding token usage in Keycloak Keycloak Token lifecycle is described at: https://www.keycloak.org/docs/latest/server_admin/index.html#_timeouts Token Lifecycle Token lifecycle is defined on a per realm...