par Mathieu PASSENAUD | Nov 7, 2022 | Gestion des Identités, Sécurité, SSO
Client Initiated Backchannel Authentication (aka CIBA) and Keycloak how-to and tool. What is the goal ? People will think that method is close to device code authentication, a way to authenticate a user without a UI. Device code without a UI : no, device code needs a...
par Loïc Mercier Des Rochettes | Sep 5, 2022 | Gestion des Identités, Open Source, Sécurité, SSO
In this article we will discuss about Postgres OAuth2 Authentication and why do we need an oauth2 on postgres. Common SSO advantages SSO (in our case with Keycloak) represents many advantages : More than a unique password, a unique login (advantages over an ldap/pg...
par Mathieu PASSENAUD | Mar 16, 2022 | Gestion des Identités, Sécurité, SSO
Transient sessions in Keycloak or how to save your cache performances ! Keycloak genrates a session on each user login and those sessions are replicated in Infinspan caches. Sometimes, you only need a token, not a session. In this article we will try to explain how to...
par Mathieu PASSENAUD | Août 13, 2021 | Gestion des Identités, Sécurité, SSO
UMA 2.0 is known as a delegation of authorizations standard but could be sometimes tricky and unclear. Keycloak is fully compatible with UMA 2.0. With a tool developped by our partner please-open.it, let’s see how to use Keycloak and UMA 2.0 with bash. This...
par Loïc Mercier Des Rochettes | Jan 28, 2021 | Gestion des Identités, SSO
Action Token in Keycloak could be very useful but tricky to implement. You may find below an article from our partner Please Open It about it’s implementation and use cases. What is an action token ? Action tokens are a particular type of token meant to allow...