Oauth2/Openid client authentication methods with Redhat SSO : this article explores the Oauth2/openID confidential client authentication methods, and brings some insights using Redhat-SSO example.
This article describes how to secure a JAVA App with RedHat SSO using OpenID. The application will have to authenticate against RedHat SSO.
It consists of the following steps:
RedHat SSO compiling Keycloack workspace with examples : this article describes how to compile succesfully keycloak and associated examples for RedHat SSO.
This article describes how it is possible to use OKTA as a SAML IDP (Identity Provider) and configure RH-SSO as a SP (Service Provider).
RedHat SSO Integration with OKTA : In this example, the NameID used is persistent. It means that user at IDP Provider (OKTA) shall also exist at SP provider (RH-SSO). Once the configuration done, it is possible to authenticate a RH-SSO user directly against OKTA IDP.
Authentication Module and Authentication Chain in OpenAM are one of its most striking features.
In this article is exposed, how to provide a step-by-step testing approach to validate a realm using an an authentication chain and module.
1. Authentication Module
AD Ldap password synchronization using OpenIDM as a black box :
OpenIDM provides 2 password synchronization plugins (AD and OpenDJ) which allows to synchronize passwords between the source (AD or OpenDJ) and OpenIDM.