par janua | Juin 21, 2019 | Communauté, Sécurité, SSO
In this article, janua’s CTO shares tips and tricks regarding access token security with Keycloak. 1. Description Tokens are issued to clients by an authorization server with the approval of the resource owner. The client uses the access token to access the...
par janua | Août 17, 2018 | Sécurité, SSO
Securing apps and services with Keycloak: a great video, thanks to Redhat developpers ! If you have a number of applications and services, the applications may be HTML5, server-side, or mobile, while the services may be monolithic or microservices, deployed...
par janua | Nov 27, 2017 | Gestion des Identités, Sécurité, SSO
1) Overview This article explains how to use the the keycloak Authz examples with Redhat SSO. 2) RH-SSO server Examples are by default provided on a a jboss server at address 8080. RH-SSO needs some parameter customization to be launched It is required to launch...
par janua | Nov 3, 2017 | Conférence, Gestion des Identités, Sécurité, SSO
This présentation to share knowledge about OpenAM 13.5 Core Token Services ( aka CTS). We will talk about: CTS Presensation CTS architectural presentation CTS setup Managing CTS tokens CTS monitoring Transcript : – – – OPENAM 13.5 – CTS by Olivier Rivat –...
par janua | Nov 3, 2017 | Gestion des Identités, Sécurité, SSO
This article describes how to investigate Oauth2 Authorization code Request. As a reminder, the principal of Oauth2 Authorization code Request is two-steps: User Authentication Consent acceptance Get an authorization code , in response of the POST exchange this...
par janua | Oct 3, 2017 | Gestion des Identités, Open Source, Sécurité, SSO
Oauth2/Openid client authentication methods with Redhat SSO : this article explores the Oauth2/openID confidential client authentication methods, and brings some insights using Redhat-SSO example. 1) Public Client, Confidential Client There are 2 types of clients:...