par janua | Nov 21, 2018 | SSO
In this section is presented how to using eclipse to debug Keycloak SPI code. The example used is the eventListener described in a previous article. Requirements You need to have eclipse installed You need to have compiled the keycloak source distribution (cf before)...
par janua | Nov 16, 2018 | Gestion des Identités, SSO
In this article, we will share how to parameter RedHat SSO Keycloak SPI adding a custom Event Listener module 1. Presentation The goal of this article is to showcase the usage of SPI usage with keycloak. For this, it is illustrated with a very simple SPI example...
par janua | Août 17, 2018 | Sécurité, SSO
Securing apps and services with Keycloak: a great video, thanks to Redhat developpers ! If you have a number of applications and services, the applications may be HTML5, server-side, or mobile, while the services may be monolithic or microservices, deployed...
par janua | Juil 10, 2018 | Communauté, SSO
1. Presentation: Architectural principles with Keycloak Redhat SSO The goal of this paper is to present how it is possible to architect a SSO-LDAP-Identity Manager infrastructure with Keycloak-Redhat SSO. Keycloak-RedHatSSO allows to register applications which...
par janua | Mai 16, 2018 | Gestion des Identités, Open Source, SSO
Howto Docker with Keycloak : In this article Janua’s CTO share tips and tricks about intégrating KeyCloak with Docker. 1) Overview The goal of this article is to showcase how it is possible to deploy very quickly keycloak examples with docker. 2) Requirements...
par janua | Avr 25, 2018 | Communauté, SSO
Janua’s CTO sharing tips and tricks about OpenID and understanding JWT and signed JWT usage with RedHat SSO Keycloak 1) JWT token presentation JWT token representation is described in RFC 7519 https://tools.ietf.org/html/rfc7519 A JWT token is made up of 3 parts...