par janua | Mar 19, 2026 | Gestion des Identités, Open Source, Sécurité, SSO
IAM: the hidden GDPR vulnerability in your cloud stack — And how Keycloak fixes it Continuing the Sovereignty Journey…. In a previous article, Digital Sovereignty: Why Your European Business Probably Breaks GDPR Law, the focus was on how U.S. cloud hyperscalers...
par Loïc Mercier Des Rochettes | Mar 6, 2026 | Gestion des Identités
How to get self-locking sessions in Keycloak with PIN step-up authentication : with our partner Please-Open It with share with you this article. Have you ever wished your Keycloak sessions could lock themselves after a few minutes of inactivity on sensitive features —...
par Loïc Mercier Des Rochettes | Fév 13, 2026 | Cloud, Communauté, Gestion des Identités
European laws and american laws are conflicting in a way that makes practically illegal for european companies to use american services to store sensitive data. Europe seems to put the rights of the individuals as the core principle behind its laws whereas the United...
par Mathieu PASSENAUD | Jan 26, 2026 | Gestion des Identités
Keycloak OAuth2-Proxy Configuration Generator: with our main partner Please-Open.It we strongly advocate the use of authentication proxy pattern. As we mentioned in our authentication proxy article, this architectural approach is one of the most efficient ways to...
par Mathieu PASSENAUD | Août 6, 2025 | Communauté, Gestion des Identités, SSO
A JWT decoder in the system tray, tips and tricks from our main partner Please-Open-IT to enhance your productivity setting up KeycCloak. With our customers, we decode JWT tokens dozens of times a day. We were tired of opening jwt.io each time so we built a simple...
par Mathieu PASSENAUD | Nov 13, 2023 | Communauté, Gestion des Identités, Sécurité, SSO
After many years in consulting, how we build our own authorizations platform using KeyCloak. Authn VS Authz First of all, we have to define with a high precision where the authentication stops and where authorization starts. Sometimes you can see posts about : ABAC :...
par janua | Avr 25, 2018 | Communauté, SSO
Janua’s CTO sharing tips and tricks about OpenID and understanding JWT and signed JWT usage with RedHat SSO Keycloak 1) JWT token presentation JWT token representation is described in RFC 7519 https://tools.ietf.org/html/rfc7519 A JWT token is made up of 3 parts...
par janua | Oct 3, 2017 | Gestion des Identités, Open Source, Sécurité, SSO
Oauth2/Openid client authentication methods with Redhat SSO : this article explores the Oauth2/openID confidential client authentication methods, and brings some insights using Redhat-SSO example. 1) Public Client, Confidential Client There are 2 types of clients:...
par janua | Sep 28, 2017 | Gestion des Identités, Open Source, Sécurité, SSO
This article describes how to secure a JAVA App with RedHat SSO using OpenID. The application will have to authenticate against RedHat SSO. It consists of the following steps: Prerequisite: RH-SSO installed JBOss Application server installed RH-SSO dapater installed...
par janua | Sep 27, 2017 | Gestion des Identités, Open Source, Sécurité, SSO
RedHat SSO compiling Keycloack workspace with examples : this article describes how to compile succesfully keycloak and associated examples for RedHat SSO. Download keyclock source tree git clone https://github.com/keycloak/keycloak.git cd keycloak 2. Select a...
par janua | Sep 26, 2017 | Gestion des Identités, Open Source, SSO
This article describes how it is possible to use OKTA as a SAML IDP (Identity Provider) and configure RH-SSO as a SP (Service Provider). RedHat SSO Integration with OKTA : In this example, the NameID used is persistent. It means that user at IDP Provider (OKTA) shall...
par janua | Sep 22, 2017 | Gestion des Identités, Sécurité, SSO
In this article we will describe how to integrate RedHat SSO with FranceConnect. 1) What is FranceConnect IDP FranceConnect (https://franceconnect.gouv.fr/) is French gouvernment IDP provider with more 20 million accounts. You can connect to it with credentials such...
par janua | Sep 15, 2017 | Gestion des Identités, Sécurité, SSO
1) Overview This article describes how it is possible to start and bring up a IAM project (Identity and Access Management) using RH-SSO 7.1 (Redhat Single Sign On). The main points tested which are: Installation of IDM solution (RH_SSO) Test of ldap connection...
par janua | Nov 25, 2016 | Communauté, Sécurité, SSO
In this Oauth2 and OpenID Connect presentation we will talk about : ● OIDC concepts ● OIDC flows ● Using OIDC with refresh token ● OIDC OpenAM use case example Oauth2 and OpenID Connect
par janua | Sep 12, 2016 | Gestion des Identités, Sécurité, SSO
Why using Oauth2-openID Connect for mobile apps ? Quite often mobile applications tend to store the user credentials to connect to the application on the mobile device itself. What if your mobile get lost or stolen ? It means that one that anybody could access...