Depuis 2004, Janua vous accompagne dans toutes les étapes de vos projets de gestion des identités et de sécurité à base de composants Open Source.

Nos domaines d’expertise :
  • Gestion des Identités et Open Source
  • Nos prestations : audit, consulting, intégration, accompagnement à la mise en production, benchmarks et support.
  • Notre approche est basée sur les processus itératifs et l’utilisation de méthodes agiles/devops en 4 phases successives:
    • Workshop d’architecture technique pour bâtir ensemble une solution durable et scalable à 5 ans.
    • Maquette ou POC pour lever les interrogations techniques et avoir une vision fine de la durée et des coûts du projet.
    • Aide au déploiement, mise en œuvre de la haute disponibilité/résilience, mise en production et documentation
    • Maintien en condition opérationnelle sur plusieurs années, mise à jour, intégration de nouveaux composants…
Nos principaux domaines d’interventions techniques :

Gestion des identités

Identity & Access Management

La gestion des identités et des accès (Identity and Access Management) est devenue …

Les annuaires LDAP

Lightweight Directory Access Protocol (LDAP) est le protocole d’accès privilégié …

SAML, OpenID & Fédération

Security assertion markup language (SAML) et OpenID Connect (OIDC) sont des standards …

La sécurité de l'IOT

La sécurité de l’IoT (Internet des Objets): Les études de la société Gartner prédisent …

Single Sign On - SSO

L’authentification unique, en anglais Single Sign-On ou SSO, est une technique …

Services

Intégration & Expertise KeyCloak

Support, intégration et expertise RedHat SSO et Keycloak

Intégration & Expertise RedHat DS

Support, intégration et expertise RedHat DS et 389 DS

Outillage LDAP & SSO

Les annuaires LDAP et les infrastructures de SSO prennent….

EDITION - OPEN SOURCE

Jaguards

Hyperviseur sûreté, main courante informatisée et gestion de crise …

LdapTools

Les consultants de Janua cumulent de nombreuses années de pratique …

TECHNICAL BLOG

Authentication Context Class Reference and Level Of Authentication with Keycloak

Keycloak now supports Authentication Context Class Reference parameter for different Level of Authentication. It means that you can define different level of authentication in a single flow. oidc-bash Our partner please-open.it has open sourced a little tool called...

Client Initiated Backchannel Authentication and Keycloak

Client Initiated Backchannel Authentication (aka CIBA) and Keycloak how-to and tool. What is the goal ? People will think that method is close to device code authentication, a way to authenticate a user without a UI. Device code without a UI : no, device code needs a...

Postgres OAuth2 Authentication

In this article we will discuss about Postgres OAuth2 Authentication and why do we need an oauth2 on postgres. Common SSO advantages SSO (in our case with Keycloak) represents many advantages : More than an unique password, an unique login (advantages over an ldap/pg...

Transient sessions in Keycloak

Transient sessions in Keycloak or how to save your cache performances ! Keycloak genrates a session on each user login and those sessions are replicated in Infinspan caches. Sometimes, you only need a token, not a session. In this article we will try to explain how to...

New Keycloak online training

Due to the current COVID19 situation, we completely renewed our training material, with our partner, in order to give our customers the possibility of a remote KeyCloak fully digital online training. We created a VM classroom environment using Vagrant so that...

Keycloak.X and Kubernetes – How to deploy a cluster

Keycloak.X will become the reference soon. According to the Keycloak Blogpost, Keycloak 18 will not support Wildfly, after that no wildfly version... Now it is time to migrate! We are still waiting for a Kubernetes operator with Keycloak.X, in this post we will see...

Keycloak and UMA 2.0 with bash

UMA 2.0 is known as a delegation of authorizations standard but could be sometimes tricky and unclear. Keycloak is fully compatible with UMA 2.0. With a tool developped by our partner please-open.it, let's see how to use Keycloak and UMA 2.0 with bash. This article...

Sizing Keycloak or Redhat SSO projects

We receive numerous inquiries about sizing Keycloak or Redhat SSO projects and installation. Nicolas Massé, solution architect from Redhat did a great job and wrote a usefull article to answer this recurrent question :...

Keycloak.X Distribution

December 16 2020 Keycloak Team Introduce Keycloak.X Distribution. The world is changing fast and IT has been an important part of the engine. As companies start moving their infrastructure to the cloud, security becomes a key factor to make this journey a success....

Action Token in Keycloak

Action Token in Keycloak could be very useful but tricky to implement. You may find below an article from our partner Please Open It about it's implementation and use cases. What is an action token ? Action tokens are a particular type of token meant to allow...