JANUA - Identity Management & Open Source
30.8K views | +0 today
Follow
 
Scooped by Pascal Flamand
onto JANUA - Identity Management & Open Source
Scoop.it!

Migrating from ODSEE to OpenDJ-WrenDS

Migrating from ODSEE to OpenDJ-WrenDS | JANUA - Identity Management & Open Source | Scoop.it
Oracle has announced that ODSEE shall be EOLed in 2019. Why not considering Migrating from ODSEE to OpenDJ-WrenDS.
No comment yet.
JANUA - Identity Management & Open Source
JANUA settled in 2004 in Sophia-Antipolis, south-east of France.  JANUA specialises in IAM (security, access control, identity management) and Open Source integration. It offers high value-added consulting, integration, products and services  with a concern for identity management and Open Source components.
Curated by Pascal Flamand
Your new post is loading...
Your new post is loading...
Scooped by Pascal Flamand
Scoop.it!

Keycloak Authenticator explained

Keycloak Authenticator explained | JANUA - Identity Management & Open Source | Scoop.it
Keycloak Authenticator explained : In this article we will explain through an example what is and how to use Keycloak Authenticator In Keycloak, an "authenticator" is a step in an authentication process, what we call "Authentication flow".
No comment yet.
Scooped by Pascal Flamand
Scoop.it!

How we build our own Authorizations platform using KeyCloak

How we build our own Authorizations platform using KeyCloak | JANUA - Identity Management & Open Source | Scoop.it
How we build our own Authorizations platform using KeyCloakAfter many years in consulting, how we build our own authorizations platform using KeyCloak. First of all, we have to define with a high precision where the authentication stops and where authorization starts.
No comment yet.
Scooped by Pascal Flamand
Scoop.it!

Keycloak as SSO for Airtable

Keycloak as SSO for Airtable | JANUA - Identity Management & Open Source | Scoop.it
This article describes how to use your Keycloak or RedHat SSO as SSO for Airtable. Only available for the "entreprise" plan, you can add your own SSO to your Airtable organization.
No comment yet.
Scooped by Pascal Flamand
Scoop.it!

Device code flow in keycloak

Device code flow in keycloak | JANUA - Identity Management & Open Source | Scoop.it
From some times now (release 13.0) Keycloak supports device code flow which can be very usefull in some cases. The device code flow is an OAuth 2.0 authorization flow used by applications that cannot securely store a client secret, such as applications installed on devices like TVs, interactive voice response systems, and printers
No comment yet.
Scooped by Pascal Flamand
Scoop.it!

Client Initiated Backchannel Authentication and Keycloak

Client Initiated Backchannel Authentication and Keycloak | JANUA - Identity Management & Open Source | Scoop.it
Client Initiated Backchannel Authentication (aka CIBA) and Keycloak how-to and tool.What is the goal ? This method is close to device code authentication, a way to authenticate a user without a UI. Device code without a UI : no, device code needs a UI ! Remember, we need a way to display a QRCode or at least a code, then the user uses another UI for login (IE : smartphone).CIBA uses another mechanism, a Client calls another backend application for authentication.
No comment yet.
Scooped by Pascal Flamand
Scoop.it!

Understanding Oauth2-OpenID scope usage with Keycloak

Understanding Oauth2-OpenID scope usage with Keycloak | JANUA - Identity Management & Open Source | Scoop.it
In this article, Janua's CTO shares tips and tricks about understanding Oauth2-OpenID scope usage with Keycloak.
No comment yet.
Scooped by Pascal Flamand
Scoop.it!

Offline Sessions and Offline tokens within Keycloak

Offline Sessions and Offline tokens within Keycloak | JANUA - Identity Management & Open Source | Scoop.it
This article is dedicated to describe the behaviour and usage of offline sessions and offline tokens within Keycloak. The behaviour of offline tokens is also illustrated through the off-line-token example of the keycloak demo template (available with version 5.0 of keycloak sources).
No comment yet.
Scooped by Pascal Flamand
Scoop.it!

Keycloak X509 Certificate Authentication

Keycloak X509 Certificate Authentication | JANUA - Identity Management & Open Source | Scoop.it
In this article Janua's CTO share tips and tricks about Keycloak X509 Certificate Authentication.
No comment yet.
Scooped by Pascal Flamand
Scoop.it!

Access Token Security with Keycloak

Access Token Security with Keycloak | JANUA - Identity Management & Open Source | Scoop.it
In this article, janua's CTO shares tips and tricks regarding access token security with Keycloak. Tokens are issued to clients by an authorization server with the approval of the resource owner. The client uses the access token to access the protected resources hosted by the resource server.
No comment yet.
Scooped by Pascal Flamand
Scoop.it!

Keycloak Access Token verification example

Keycloak Access Token verification example | JANUA - Identity Management & Open Source | Scoop.it
This article describes how it is possible to validate a keycloak access token and performing signature verification.The realm public key is uploaded in order to verify the access token signaure
No comment yet.
Scooped by Pascal Flamand
Scoop.it!

Understanding UMA and Keycloak

Understanding UMA and Keycloak | JANUA - Identity Management & Open Source | Scoop.it
In this article, we will try to understand and demistify UMA and Keycloak. UMA is quit new and we will try to understand the new paradigms, use cases and demonstrate its implementation within Keycloak.
No comment yet.
Scooped by Pascal Flamand
Scoop.it!

Using apache2 mod_auth_openidc module with Keycloak (OpenID Connect)

Using apache2 mod_auth_openidc module with Keycloak (OpenID Connect) | JANUA - Identity Management & Open Source | Scoop.it
In this article, we will share how to using apache2 mod_auth_openidc module with Keycloak (OpenID Connect)
No comment yet.
Scooped by Pascal Flamand
Scoop.it!

Understanding keycloak user Federation

Understanding keycloak user Federation | JANUA - Identity Management & Open Source | Scoop.it
In this article, Janua's CTO shares tips and tricks about understanding keycloak user Federation
No comment yet.
Scooped by Pascal Flamand
Scoop.it!

Keycloak OIDC authentication with N8N workflow

Keycloak OIDC authentication with N8N workflow | JANUA - Identity Management & Open Source | Scoop.it
This article to share how we use Keycloak OIDC authentication with N8N workflow used internally. Please Open It has its own instance of n8n for internal automations : billing, emails etc… Connecting applications to each other is simpler, especially on data management (json manipulations).
No comment yet.
Scooped by Pascal Flamand
Scoop.it!

Keycloak config checker

Keycloak config checker | JANUA - Identity Management & Open Source | Scoop.it
As is, Keycloak has a default configuration which can introduce security flaws despite your manual testing, that why our partner Please Open It developed this Keycloak Config Checker to help you enforce your security practices.
No comment yet.
Scooped by Pascal Flamand
Scoop.it!

Keycloak: SSH connection with OAuth2

Keycloak: SSH connection with OAuth2 | JANUA - Identity Management & Open Source | Scoop.it
You can use the SSH OAuth2 authentication method to connect to Keycloak with SSH. This requires that you generate an SSH key pair and register it in your Keycloak account. You will then need to configure your SSH client to use the OAuth2 authentication method.
No comment yet.
Scooped by Pascal Flamand
Scoop.it!

Keycloak: SSH connection with OAuth2

Keycloak: SSH connection with OAuth2 | JANUA - Identity Management & Open Source | Scoop.it
You can use the SSH OAuth2 authentication method to connect to Keycloak with SSH. This requires that you generate an SSH key pair and register it in your Keycloak account. You will then need to configure your SSH client to use the OAuth2 authentication method.
No comment yet.
Scooped by Pascal Flamand
Scoop.it!

LDAP integration with Keycloak

LDAP integration with Keycloak | JANUA - Identity Management & Open Source | Scoop.it
LDAP integration with Keycloak seems to be confusing for a lot of us, and we face a lot of questions about it, it's why we try in this article to become clearer in this article.
No comment yet.
Scooped by Pascal Flamand
Scoop.it!

Using Impersonation with Keycloak

Using Impersonation with Keycloak | JANUA - Identity Management & Open Source | Scoop.it
Using Impersonation with Keycloak : Impersonation is very useful feature in IAM system today. It allows to execute an action being logged as dedicated admin-user to act on specific user actions..
No comment yet.
Scooped by Pascal Flamand
Scoop.it!

PKCE support with Keycloak 7.0

PKCE support with Keycloak 7.0 | JANUA - Identity Management & Open Source | Scoop.it
PKCE support with Keycloak 7.0: Keycloak 7.0 has been released on Aug 25th 2019 with PKCE support. This represents a major breakthrough for all mobile apps to increase security and to mitigate malicious attacks
No comment yet.
Scooped by Pascal Flamand
Scoop.it!

UMA policy enforcers with KeyCloak

UMA policy enforcers with KeyCloak | JANUA - Identity Management & Open Source | Scoop.it
In this article we will share understanding UMA policy enforcers with KeyCloak.
No comment yet.
Scooped by Pascal Flamand
Scoop.it!

How to install KeyCloak with MariaDB

How to install KeyCloak with MariaDB | JANUA - Identity Management & Open Source | Scoop.it
This chapter illustrates how to install Keycloak with MariaDB database and how it is possible to configure MariaDB with KeyCloak.
No comment yet.
Scooped by Pascal Flamand
Scoop.it!

TOC training Keycloak RedhatSSO UMA

Table des matières du support de cours KeyCloak RedhatSSO UMA
No comment yet.
Scooped by Pascal Flamand
Scoop.it!

Understanding Keycloak RedHat SSO Authentication

Understanding Keycloak RedHat SSO Authentication | JANUA - Identity Management & Open Source | Scoop.it
In this article, we will share tips and tricks about understanding Keycloak RedHat SSO Authentication mecanisms.
No comment yet.
Scooped by Pascal Flamand
Scoop.it!

Protecting Keycloak RedHat SSO with a Reverse Proxy

Protecting Keycloak RedHat SSO with a Reverse Proxy | JANUA - Identity Management & Open Source | Scoop.it
In this article are exposed some of the key concepts protecting a Keycloak RedHat SSO with a reverse proxy in production.Protecting the keycloak server is crucial. Keycloak server should not be visible from the outside
No comment yet.