Red Hat Single sign-on

2020-devnation-carat.png
Page

DevNation Day 2020

DevNation Day is a free, all-day immersive virtual experience created to bring you the most exciting developer and technology updates. It will cover four topics areas: Kubernetes/OpenShift, JavaScript, Python, and Java. You will hear from Red Hat Developer experts as well as leaders from across a number of companies and industries, including Google, MongoDB, Redis, Snyk, Tail, Auth0, Ionic, and more. Stay up-to-date on the latest technologies from the comfort of your own desk, and interface with our speakers through polls, chats, and on-stage participation. We look forward to ‘seeing’ you there!

Keycloak architecture diagram
Article

A deep dive into Keycloak

Stian Thorgersen +1

In this DevNation Tech Talk, we take a deep dive into Keycloak to handle open source identity and access management with modern applications and services.

Keycloak
Article

Keycloak: Core concepts of open source identity and access management

Abhishek Koserwal

Keycloak provides the flexibility to export and import configurations easily, using a single view to manage everything. Together, these technologies let you integrate front-end, mobile, and monolithic applications into a microservice architecture. In this article, we discuss the core concepts and features of Keycloak and its application integration mechanisms. You will find links to implementation details near the end. Core concepts Let's start with Keycloak's core concepts, as shown in Figure 1: Figure 1: Keycloak's core concepts."> A Keycloak realm...

Devnation
Page

DevNation

The place for all things DevNation. Join developers across the globe for live and virtual events led by the Red Hat technologists who create our products. Sessions include weekly tech talks, deep dives on key developer topics, and live events.

How Hackers are Manipulating Our World
Article

The Dark Side: How Hackers are Manipulating Our World

Samantha Donaldson

To the average web developer, a hacker may seem simply like a nuisance, easily avoidable with the implementation of security standards and encryption methods. However, to many Americans nationwide, hackers are often defined as “super geniuses” which can “crack” into anything and terrorize our world. The main reason for this somewhat misguided interpretation of the hacking community is the fact that the media typically portrays these individuals as coffee-guzzling, cigarette-smoking rebels dressed in black, hiding in shadows, and wreaking havoc...

Internet of things feature image
Article

Wearable Tech: A Developer’s Security Nightmare

Samantha Donaldson

Web developers and IT professionals are the foundations of any quality business’ data security. However, with technology constantly changing and evolving as well as becoming more consumer-friendly, this data’s vulnerability only increases and it can often be hard to even notice how this new technology can actually affect your company until it occurs. Despite this, ignorance to modern hacking techniques does not refute their inability to transform even the smallest of devices into a weapon with which to infect or...

Article Thumbnail
Article

How Red Hat re-designed its Single Sign On (SSO) architecture, and why.

Brian Atkisson

Red Hat, Inc. recently released the Red Hat SSO product, which is an enterprise application designed to provide federated authentication for web and mobile applications. In the SAML world, RH SSO is known as an Identity Provider (IdP), meaning its role in life is to authenticate and authorize users for use in a federated identity management system. For example, it can be used to authenticate internal users against a corporate LDAP instance such that they can then access the corporate...

Article Thumbnail
Article

Red Hat Identity Manager: Part 1 - Overview and Getting started

Brian Atkisson

Red Hat Identity Manager (IdM), is designed to provide an integrated identity management service for a wide range of clients, including Linux, Mac, and even Windows. At its core, IdM combines LDAP, Kerberos, DNS, and PKI with a rich management framework. Frequently, IdM is described as "Active Directory for Linux". Although, to be fair, Active Directory is really just a management framework around LDAP, Kerberos, DNS and PKI -- all of which were well established in the unix community long...

GNU C library
Article

Multi-Thread, Async-Signal and Async-Cancel Safety Docs in GNU libc

Alexandre Oliva

POSIX specifies which of the interfaces it defines are safe to call in multi-threaded (MT) programs, in asynchronous signal (AS) handlers, and when asynchronous thread cancellation (AC) is enabled. But to what extent does GNU libc comply with POSIX, or even strive to? In this article we will dig into this topic and look at a recent project Red Hat has completed together with the upstream community. Although GNU libc strives to comply with POSIX, there have long been differences...