Démos Red Hat Single Sign On
Au travers d’une série de trois vidéos, je présente Red Hat Single Sign On (la distribution Red Hat de Keycloak). Je commence par l’installation, la fédération des identités, puis vient la sécurisation d’une application NodeJS. Et enfin, on termine par la sécurisation d’une application Quarkus. Retrouvez @nmasse_itix pour une nouvelle série d'épisodes de La Démo Box dédiée à Red Hat Single Sign-On ! Dans ce 1er épisode, découvrez comme configurer la fédération d'identités. Continuer la lecture
Configure Red Hat SSO for 3scale using the CLI!
3scale API Management can be used in conjunction with Red Hat SSO / Keycloak to secure APIs managed by 3scale using the OpenID Connect protocol. The official documentation describes the steps to configure Red Hat SSO / Keycloak but it uses the Graphical User Interface, which can be tedious if you have multiple environments to configure. Let’s configure Red Hat SSO for 3scale using the CLI! Continuer la lecture
Secure your Raspberry PI with Keycloak Gatekeeper on OpenWRT
In the article “Nginx with TLS on OpenWRT”, I explained how to install nginx on a Raspberry PI running OpenWRT for hosting web applications. Some of the web applications that I installed on my Raspberry PI do not feature any authentication mechanism at all. No authentication means that anybody on the internet could reach those applications and play with them. This article explains how to secure applications running on a Raspberry PI with Keycloak Gatekeeper. Continuer la lecture
Secure a Quarkus API with Keycloak
Quarkus is a Java stack that is Kubernetes native, lightweight and fast. Quarkus can be used for any type of backend development, including API-enabled backends. Keycloak is an open source Single Sign On solution that can be used to secure APIs. In this article, I’m describing how to secure a Quarkus API with Keycloak using JWT tokens. Continuer la lecture
Running Red Hat SSO outside of OpenShift
In an article named Red Hat Single Sign-On: Give it a try for no cost!, I explained how to deploy Red Hat SSO very easily in any OpenShift cluster. As pointed by a reader in a comment, as widespread OpenShift can be, not everyone has access to a running OpenShift cluster. So, here is how to run Red Hat SSO outside of OpenShift: using only plain Docker commands. Continuer la lecture
Red Hat Single Sign-On: Give it a try for no cost!
In a software world where each day is more hostile than the previous one, security matters and developers are coping with more and more non-functional requirements about security. The most common ones are the “OWASP Top 10”: the ten security risks that every developer should know. There are many more security risks you should care about, but those ten risks are the ones having the most impact on the security of your software. Continuer la lecture
Using a public certificate with Red Hat Single Sign-On/Keycloak
When deploying Red Hat Single Sign-On/Keycloak for a test or a proof of concept, most users will choose to use a self-signed certificate as explained in the official documentation. The setup instructions are straightforward, but this self-signed certificate will trigger certificate error messages in your web browser and can also prevent some clients such as Postman from working properly. This article explains how to use a public certificate from Let’s Encrypt with Red Hat Single Sign-On. Continuer la lecture