par janua | Nov 3, 2017 | Gestion des Identités, Sécurité, SSO
This article describes how to investigate Oauth2 Authorization code Request. As a reminder, the principal of Oauth2 Authorization code Request is two-steps: User Authentication Consent acceptance Get an authorization code , in response of the POST exchange this...
par janua | Oct 3, 2017 | Gestion des Identités, Open Source, Sécurité, SSO
Oauth2/Openid client authentication methods with Redhat SSO : this article explores the Oauth2/openID confidential client authentication methods, and brings some insights using Redhat-SSO example. 1) Public Client, Confidential Client There are 2 types of clients:...
par janua | Sep 28, 2017 | Gestion des Identités, Open Source, Sécurité, SSO
This article describes how to secure a JAVA App with RedHat SSO using OpenID. The application will have to authenticate against RedHat SSO. It consists of the following steps: Prerequisite: RH-SSO installed JBOss Application server installed RH-SSO dapater installed...
par janua | Sep 27, 2017 | Gestion des Identités, Open Source, Sécurité, SSO
RedHat SSO compiling Keycloack workspace with examples : this article describes how to compile succesfully keycloak and associated examples for RedHat SSO. Download keyclock source tree git clone https://github.com/keycloak/keycloak.git cd keycloak 2. Select a...
par janua | Sep 26, 2017 | Gestion des Identités, Open Source, SSO
This article describes how it is possible to use OKTA as a SAML IDP (Identity Provider) and configure RH-SSO as a SP (Service Provider). RedHat SSO Integration with OKTA : In this example, the NameID used is persistent. It means that user at IDP Provider (OKTA) shall...