Access Token Security with Keycloak

In this article, janua’s CTO shares tips and tricks regarding access token security with Keycloak. 1. Description Tokens are issued to clients by an authorization server with the approval of the resource owner. The client uses the access token to access the...

Understanding UMA and Keycloak

In this article, we will try to understand and demistify UMA and Keycloak. UMA is quit new and we will try to understand the new paradigms, use cases and demonstrate its implementation within Keycloak. 1 Presentation – What is UMA ? UMA stands for User Management...