This présentation to share knowledge about OpenAM 13.5 Core Token Services ( aka CTS). We will talk about:
- CTS Presensation
- CTS architectural presentation
- CTS setup
- Managing CTS tokens
- CTS monitoring
This article describes how to investigate Oauth2 Authorization code Request.
As a reminder, the principal of Oauth2 Authorization code Request is two-steps:
Oauth2/Openid client authentication methods with Redhat SSO : this article explores the Oauth2/openID confidential client authentication methods, and brings some insights using Redhat-SSO example.
This article describes how to secure a JAVA App with RedHat SSO using OpenID. The application will have to authenticate against RedHat SSO.
It consists of the following steps:
RedHat SSO compiling Keycloack workspace with examples : this article describes how to compile succesfully keycloak and associated examples for RedHat SSO.
This article describes how it is possible to use OKTA as a SAML IDP (Identity Provider) and configure RH-SSO as a SP (Service Provider).
RedHat SSO Integration with OKTA : In this example, the NameID used is persistent. It means that user at IDP Provider (OKTA) shall also exist at SP provider (RH-SSO). Once the configuration done, it is possible to authenticate a RH-SSO user directly against OKTA IDP.