Depuis 2004, Janua vous accompagne dans toutes les étapes de vos projets de gestion des identités et open source, de sécurité et de mise en œuvre de logiciels libres.

Nos domaines d’expertise :
  • Gestion des Identités et Open Source
  • Nos prestations : audit, consulting, intégration, accompagnement à la mise en production, benchmarks et support.
  • Notre approche : les processus itératifs, les maquettes (POC) et l’utilisation de méthodes « agiles ».
Nos principaux domaines d’interventions techniques :

Gestion des identités

Identity & Access Management

La gestion des identités et des accès (Identity and Access Management) est devenue …

Les annuaires LDAP

Lightweight Directory Access Protocol (LDAP) est le protocole d’accès privilégié …

SAML, OpenID & Fédération

Security assertion markup language (SAML) et OpenID Connect (OIDC) sont des standards …

La sécurité de l'IOT

La sécurité de l’IoT (Internet des Objets): Les études de la société Gartner prédisent …

Single Sign On - SSO

L’authentification unique, en anglais Single Sign-On ou SSO, est une technique …

Provisioning d'identités

La multiplication des référentiels d’identité au sein des entreprises (AD, LDAP, Oracle …

Services

Support & Expertise OpenDJ

Offre de support OpenDJ et WrenDS complète…

Intégration & Expertise RedHat SSO

Support, intégration et expertise RedHat SSO et Keycloak complète…

Support & Expertise OpenAM

Offre de support OpenIG, OpenAM et WrenAM complète …

Intégration & Expertise RedHat DS

Support, intégration et expertise RedHat DS et 389 DS complète…

Support & Expertise OpenIDM

Offre de support OpenIDM et WrenIDM complète …

Outillage LDAP & SSO

Les annuaires LDAP et les infrastructures de SSO prennent….

EDITION - OPEN SOURCE

Jaguards

logiciel de main courante informatisée et gestion de crise pour SDIS, Aéroports …

CMakeBuilder

CMakeBuilder est un plugin Eclipse qui vous permet de créer ou maintenir des projets …

LdapTools

Les consultants de Janua cumulent de nombreuses années de pratique …

TECHNICAL BLOG

Understanding keycloak user Federation

In this article, Janua's CTO shares tips and tricks about understanding Keycloak user Federation 1 Understanding Keycloak user Federation 1.1 Overview Keycloak comes up with a user storage SPI. By default Keycloak comes with 3 different user storage federation...

Examples of offline token usage in Keycloak

In this article we share examples of offline token usage in Keycloak. As mentioned previously, it is possible to generate offline either through direct access grant or authorization code flow. Both way are going to be illustrated in this chapter Using offline Token...

Understanding token usage in Keycloak

In this article Janua's CTO shares tips and tricks about understanding token usage in Keycloak Keycloak Token lifecycle is described at: https://www.keycloak.org/docs/latest/server_admin/index.html#_timeouts Token Lifecycle Token lifecycle is defined on a per realm...

understanding client Authenticator security with Keycloak

In this article, we will share tips and tricks about understanding client Authenticator security with Keycloak When people think about using keycloak Authorization code flow, the most straightforward to use it is to use Authoriszation Code Flow with client ID/Client...

Configuring DS389 aka RedHat DS as 2MMR

In this article Janua's CTO share how to configuring DS389 aka RedHat DS as 2MMR Step 1 – enable Change log (Master M1) Step2 – Enable Replica (Master M1) Step3 – Create replication Manager (Master M1) ldapadd -h localhost -p 2389 -D "Cn=Directory Manager" -w secret12...

Configuring SSL/TLS with DS389 aka RedHat DS

In this article Janua's CTO will share how to configuring SSL/TLS with DS389 aka RedHat DS Step 1 – Create Keystore Requirement Position yourself in the directory Cd /etc/dirsrv/slapd-myserver-5389 1.1) Creation of password files (pin.txt) pin.txt (used by slapd) echo...

Using Client Scope with RedHat SSO Keycloak

The goal of this article is to explain how it is possible using client scopes with RedHat SSO keycloak .Client scopes are entities in Keycloak, which are configured at the realm level and they can be linked to clients. The client scopes are referenced by their name...

Mapping LDAP Group and Roles to RedHat SSO Keycloak

Mapping LDAP Group and Roles to RedHat SSO Keycloak : the goal of this article is to showcase how it is possible to expose and to use LDAP roles at keycloak level. This feature will illustrated by creating new users which belong to the ldap-admin group. Those new...

SunOne DS to RedHat DS migration with different charset

1) Presentation When making a SunOne DS to RedHat-DS migration with different charset: Redhat DS is using UTF-8 charset. It means ldif import files used by RH-DS have to be  UTF-8. This is even more true, when it comes to binary data, which ought to be encoded using...

Multi Factor Authentication with Keycloak

In this article, we will try to  synthesize about Multi Factor Authentication with Keycloak and RedHat SSO. Presentation MFA stands For multi-factor authentication. Usual authentication with username/password is one of the weakest authentication scheme possible, which...