par janua | Nov 21, 2018 | SSO
In this section is presented how to using eclipse to debug Keycloak SPI code. The example used is the eventListener described in a previous article. Requirements You need to have eclipse installed You need to have compiled the keycloak source distribution (cf before)...
par janua | Nov 16, 2018 | Gestion des Identités, SSO
In this article, we will share how to parameter RedHat SSO Keycloak SPI adding a custom Event Listener module 1. Presentation The goal of this article is to showcase the usage of SPI usage with keycloak. For this, it is illustrated with a very simple SPI example...
par janua | Août 17, 2018 | Sécurité, SSO
Securing apps and services with Keycloak: a great video, thanks to Redhat developpers ! If you have a number of applications and services, the applications may be HTML5, server-side, or mobile, while the services may be monolithic or microservices, deployed...
par janua | Juil 10, 2018 | Communauté, SSO
1. Presentation: Architectural principles with Keycloak Redhat SSO The goal of this paper is to present how it is possible to architect a SSO-LDAP-Identity Manager infrastructure with Keycloak-Redhat SSO. Keycloak-RedHatSSO allows to register applications which...
par janua | Juin 20, 2018 | Gestion des Identités, Open Source
This paper describes how to leverage Keycloak/RH-SSO in a microservice SAAS Architecture. 1) SAAS: Software as a Service with KeyCloak All Saas Applications are registered within keycloak as client service using confidential mode. A Saas application can be...
par janua | Mai 16, 2018 | Gestion des Identités, Open Source, SSO
Howto Docker with Keycloak : In this article Janua’s CTO share tips and tricks about intégrating KeyCloak with Docker. 1) Overview The goal of this article is to showcase how it is possible to deploy very quickly keycloak examples with docker. 2) Requirements...
par janua | Avr 30, 2018 | Gestion des Identités, LDAP
Oracle has announced that ODSEE shall be EOLed in 2019. Why not considering Migrating from ODSEE to OpenDJ-WrenDS. According to Oracle roadmap, ODSEE replacement is OUD (Oracle Unified Directory). But do you know that OUD and OpenDJ both originates from Sun OpenDS...
par janua | Avr 25, 2018 | Communauté, SSO
Janua’s CTO sharing tips and tricks about OpenID and understanding JWT and signed JWT usage with RedHat SSO Keycloak 1) JWT token presentation JWT token representation is described in RFC 7519 https://tools.ietf.org/html/rfc7519 A JWT token is made up of 3 parts...
par janua | Avr 16, 2018 | Gestion des Identités, SSO
In this article we will share with you our understanding of oauth2 bearer token usage with RedHat SSO Keycloak. 1. Overview Access Token are defined by RFC 6750, and are of type Bearer Token. Access Tokens are used to access to the content of a resource according to...
par janua | Avr 9, 2018 | Communauté, Gestion des Identités, SSO
In this article we will try to understand the difference between client ID-Client secret and signed JWT authentication Scheme in RedHat SSO (aka Keycloak). 1) Presentation When dealing with Oauth2/openID RH-SSO provides 3 possible authentication schemes which are:...
par janua | Nov 27, 2017 | Gestion des Identités, Sécurité, SSO
1) Overview This article explains how to use the the keycloak Authz examples with Redhat SSO. 2) RH-SSO server Examples are by default provided on a a jboss server at address 8080. RH-SSO needs some parameter customization to be launched It is required to launch...
par janua | Nov 24, 2017 | Gestion des Identités, SSO
1) Overview Understanding Authorisation Services with Redhat SSO : Authorisation Services is a major key component of an Identity and Access Management Solution. It allows to define the resources and scopes a user is entitled to (i.e. permission). Like this is...
par janua | Nov 3, 2017 | Conférence, Gestion des Identités, Sécurité, SSO
This présentation to share knowledge about OpenAM 13.5 Core Token Services ( aka CTS). We will talk about: CTS Presensation CTS architectural presentation CTS setup Managing CTS tokens CTS monitoring Transcript : – – – OPENAM 13.5 – CTS by Olivier Rivat –...
par janua | Nov 3, 2017 | Gestion des Identités, Sécurité, SSO
This article describes how to investigate Oauth2 Authorization code Request. As a reminder, the principal of Oauth2 Authorization code Request is two-steps: User Authentication Consent acceptance Get an authorization code , in response of the POST exchange this...
par janua | Oct 3, 2017 | Gestion des Identités, Open Source, Sécurité, SSO
Oauth2/Openid client authentication methods with Redhat SSO : this article explores the Oauth2/openID confidential client authentication methods, and brings some insights using Redhat-SSO example. 1) Public Client, Confidential Client There are 2 types of clients:...