How to secure your Spring apps with Keycloak by Thomas Darimont @ Spring I/O 2019
Spring I/O 2019 - Barcelona, 16-17 May
Keycloak provides Single Sign-On based on widely used protocols such as OpenID Connect 1.0, OAuth 2.0 and SAML2, that are easy to integrate with own applications. Keycloak comes with many batteries included, e.g. user management, user registration, 2-factor authentication, support for external identity providers such as Google, Facebook, Twitter, custom look-and-feel and integration with directory services like LDAP, Kerberos or Active Directory. Additionally, Keycloak offers a comprehensive extension model that makes it easy to adapt it to your own needs.
After a short overview of Keycloak features, we will introduce some core concepts with a guided tour through Keycloaks Admin UI. We then take an in-depth look at an OAuth / OpenID Connect based authentication flow. After those foundations are set we will demonstrate possibilities for integrating Keycloak in selected authentication scenarios. We conclude the talk with a brief demo of an centralized identity management infrastructure, built around Keycloak.
Видео How to secure your Spring apps with Keycloak by Thomas Darimont @ Spring I/O 2019 канала Spring I/O
Keycloak provides Single Sign-On based on widely used protocols such as OpenID Connect 1.0, OAuth 2.0 and SAML2, that are easy to integrate with own applications. Keycloak comes with many batteries included, e.g. user management, user registration, 2-factor authentication, support for external identity providers such as Google, Facebook, Twitter, custom look-and-feel and integration with directory services like LDAP, Kerberos or Active Directory. Additionally, Keycloak offers a comprehensive extension model that makes it easy to adapt it to your own needs.
After a short overview of Keycloak features, we will introduce some core concepts with a guided tour through Keycloaks Admin UI. We then take an in-depth look at an OAuth / OpenID Connect based authentication flow. After those foundations are set we will demonstrate possibilities for integrating Keycloak in selected authentication scenarios. We conclude the talk with a brief demo of an centralized identity management infrastructure, built around Keycloak.
Видео How to secure your Spring apps with Keycloak by Thomas Darimont @ Spring I/O 2019 канала Spring I/O
Показать
Комментарии отсутствуют
Информация о видео
Другие видео канала
How to secure your Microservices with Keycloak - Thomas DarimontExplain it to Me Like I’m 5: Oauth2 and OpenIDHow to secure your Spring Apps with Keycloak by Thomas Darimont @ Spring I/O 2018Easily secure and add Identity Management to your Spring Boot applications by Sebastien BlancGraalVM for Java developers by Oleg Šelajev @ Spring I/O 2019OAuth and OpenID Connect for MicroservicesBootiful TDD by Josh Long @ Spring I/O 2019The Rise Of Open-Source SoftwareRSocket - Future Reactive Application Protocol by Oleh Dokuka @ Spring I/O Bridge[Rennes DevOps - BreizhJUG] Sécurisez vos applications avec Keycloak - Jérôme MarchandBilding an effective identity and access management architecture with KeycloakReactive Spring. Josh Long, PivotalOAuth 2.0 and OpenID Connect (in plain English)How To Integrate Keycloak With Spring Cloud Gateway - Part 1How to Secure Enterprise Microservice architecture with SSO | Keycloak with Open Policy AgentKeycloak IntroSpring Tips: Spring Cloud Gateway (Redux)Reactive Spring • Josh Long • GOTO 2019Path to success with your Red Hat Identity Management deployment