par janua | Déc 17, 2014 | Gestion des Identités, IoT, Sécurité
Identity Management in the IoT (Internet of things). IoT is more like an umbrella term that encompasses different architectures where for example things can talk to each other, talk to a computer sitting at home or in the cloud, to a proxy or mobile phone or even to...
par janua | Juil 20, 2014 | Gestion des Identités, Produit, Sécurité
IoT and OpenIDM: watch Jean-Francois Rubon from Gemalto demo a real-life IRM (Identity Relationship Management) scenario, connecting a real person’s identity to a mobile phone that may, or may not, be allowed to open a physical door. It’s done through an...
par janua | Avr 16, 2020 | Communauté, SSO
Notre (excellent) partenaire Please Open It organise le 22 Avril à 18h un webinaire « Autoriser les accès à mon API à des services tiers ». N’hésitez pas à vous connecter, à écouter et à maniper avec Mathieu Passenaud. Les informations de connexion ci dessous :...
par janua | Juin 11, 2019 | Gestion des Identités, Open Source, SSO
This article describes how it is possible to validate a Keyloak access token and performing signature verification. The RSA realm public key is uploaded in order to verify the access token signature The example is illustrated using jwt.io debugger debugger, but could...
par janua | Avr 25, 2018 | Communauté, SSO
Janua’s CTO sharing tips and tricks about OpenID and understanding JWT and signed JWT usage with RedHat SSO Keycloak 1) JWT token presentation JWT token representation is described in RFC 7519 https://tools.ietf.org/html/rfc7519 A JWT token is made up of 3 parts...