par Loïc Mercier Des Rochettes | Fév 13, 2026 | Cloud, Communauté, Gestion des Identités
European laws and american laws are conflicting in a way that makes practically illegal for european companies to use american services to store sensitive data. Europe seems to put the rights of the individuals as the core principle behind its laws whereas the United...
par Mathieu PASSENAUD | Jan 26, 2026 | Gestion des Identités
Keycloak OAuth2-Proxy Configuration Generator: with our main partner Please-Open.It we strongly advocate the use of authentication proxy pattern. As we mentioned in our authentication proxy article, this architectural approach is one of the most efficient ways to...
par Mathieu PASSENAUD | Août 6, 2025 | Communauté, Gestion des Identités, SSO
A JWT decoder in the system tray, tips and tricks from our main partner Please-Open-IT to enhance your productivity setting up KeycCloak. With our customers, we decode JWT tokens dozens of times a day. We were tired of opening jwt.io each time so we built a simple...
par Mathieu PASSENAUD | Nov 13, 2023 | Communauté, Gestion des Identités, Sécurité, SSO
After many years in consulting, how we build our own authorizations platform using KeyCloak. Authn VS Authz First of all, we have to define with a high precision where the authentication stops and where authorization starts. Sometimes you can see posts about : ABAC :...
par janua | Avr 25, 2018 | Communauté, SSO
Janua’s CTO sharing tips and tricks about OpenID and understanding JWT and signed JWT usage with RedHat SSO Keycloak 1) JWT token presentation JWT token representation is described in RFC 7519 https://tools.ietf.org/html/rfc7519 A JWT token is made up of 3 parts...
par janua | Oct 3, 2017 | Gestion des Identités, Open Source, Sécurité, SSO
Oauth2/Openid client authentication methods with Redhat SSO : this article explores the Oauth2/openID confidential client authentication methods, and brings some insights using Redhat-SSO example. 1) Public Client, Confidential Client There are 2 types of clients:...
par janua | Sep 28, 2017 | Gestion des Identités, Open Source, Sécurité, SSO
This article describes how to secure a JAVA App with RedHat SSO using OpenID. The application will have to authenticate against RedHat SSO. It consists of the following steps: Prerequisite: RH-SSO installed JBOss Application server installed RH-SSO dapater installed...
par janua | Sep 27, 2017 | Gestion des Identités, Open Source, Sécurité, SSO
RedHat SSO compiling Keycloack workspace with examples : this article describes how to compile succesfully keycloak and associated examples for RedHat SSO. Download keyclock source tree git clone https://github.com/keycloak/keycloak.git cd keycloak 2. Select a...
par janua | Sep 26, 2017 | Gestion des Identités, Open Source, SSO
This article describes how it is possible to use OKTA as a SAML IDP (Identity Provider) and configure RH-SSO as a SP (Service Provider). RedHat SSO Integration with OKTA : In this example, the NameID used is persistent. It means that user at IDP Provider (OKTA) shall...
par janua | Sep 22, 2017 | Gestion des Identités, Sécurité, SSO
In this article we will describe how to integrate RedHat SSO with FranceConnect. 1) What is FranceConnect IDP FranceConnect (https://franceconnect.gouv.fr/) is French gouvernment IDP provider with more 20 million accounts. You can connect to it with credentials such...
par janua | Sep 15, 2017 | Gestion des Identités, Sécurité, SSO
1) Overview This article describes how it is possible to start and bring up a IAM project (Identity and Access Management) using RH-SSO 7.1 (Redhat Single Sign On). The main points tested which are: Installation of IDM solution (RH_SSO) Test of ldap connection...
par janua | Nov 25, 2016 | Communauté, Sécurité, SSO
In this Oauth2 and OpenID Connect presentation we will talk about : ● OIDC concepts ● OIDC flows ● Using OIDC with refresh token ● OIDC OpenAM use case example Oauth2 and OpenID Connect
par janua | Sep 12, 2016 | Gestion des Identités, Sécurité, SSO
Why using Oauth2-openID Connect for mobile apps ? Quite often mobile applications tend to store the user credentials to connect to the application on the mobile device itself. What if your mobile get lost or stolen ? It means that one that anybody could access...
par janua | Jan 25, 2016 | Communauté, Documents, Gestion des Identités, Open Source, Presse, Sécurité, SSO
Présentation de Janua 2016: expertises, missions et domaines d’intervention. Présentation Janua 2016: Janua est une société de service et de consulting qui se propose de vous accompagner vers le monde de la gestion des identités, de la sécurité et des logiciels...
par janua | Déc 30, 2015 | CAS, Cloud, Communauté, Developpement, Gestion des Identités, IoT, LDAP, Open Source, Sécurité, SSO
JANUA recrute experts, architectes et intégrateurs en gestion des identités, avec en particulier une forte expérience sur les logiciels Open Source suivants : OpenAM, OpenDJ, OpenIDM. Localisation indifférente: home office plus déplacements chez les clients. Contact...