How to secure your Microservices with Keycloak - Thomas Darimont

Sdílet
Vložit
  • čas přidán 24. 06. 2019
  • Voxxed Days Luxembourg 2019
    Room: Linux
    Type: Conference
    Title: How to secure your Microservices with Keycloak
    Speaker: Thomas Darimont (codecentric AG)
  • Věda a technologie

Komentáře • 50

  • @kostia2271
    @kostia2271 Před 11 měsíci +3

    One of the best explanation of SSO in Keycloak using OIDC I've ever seen

  • @yifeifeng7150
    @yifeifeng7150 Před 2 lety +25

    02:22 Overview
    05:28 Features
    09:02 Main Concepts
    11:48 Quick Tour - Admin Console
    12:43 Admin Console Demo - Configure
    19:00 Admin Console Demo - Manage
    20:12 Technology Stack
    22:04 Server Architecture
    24:59 SSO with OIDC
    29:34 Keycloak Tokens
    33:22 JSON Web Tokens
    34:42 JWT Example
    36:39 Calling Backend Services with Access Token
    39:17 Keycloak Client Integrations
    41:25 Keycloak Demo - Securing Apps
    41:28 Demo Environment
    41:54 Demo Services
    45:35 Demo Applications
    47:10 Github Repository
    47:55 Keycloak in the field
    51:54 Summary
    53:05 Keycloak Extension Playground

  • @sugengdcahyolab1194
    @sugengdcahyolab1194 Před 17 dny

    Finaly i got best of explanation about SSO with Keycloak
    big thanks

  • @antonioapaestegui8711
    @antonioapaestegui8711 Před měsícem

    This was great!!! Completely answered questions I had about backend validating tokens

  • @rajeevp1438
    @rajeevp1438 Před 3 lety +7

    Thanks a lot Thomas. One of the best sessions I watched in recent times. Very informative. Learned a lot. Will definitely give a try.

  • @KauBaby
    @KauBaby Před 3 lety +3

    Hat's off to you Thomas; truly great insight on KeyCloak and its capabilities. I was badly looking for AD/ADFS integration and was not getting right pointers. Thank you very much; you are a great professional !!!

  • @lioncat2706
    @lioncat2706 Před 4 lety +25

    Great demo! I learned a lot of stuff, not just keycloak.
    I kinda feel that Keycloak can be a great substitute for Auth0.

  • @UsamaNada
    @UsamaNada Před 2 lety +3

    Thanks. Well prepared, well presented, Informative demo and presentation. Learned a lot in this session.

  • @oleksandrpobereznichenko4982

    Great introduction! Thank you Thomas!

  • @adampzakaria
    @adampzakaria Před 4 lety +1

    Awesome presentation. Thanks Thomas :D

  • @mohamedmauroof7286
    @mohamedmauroof7286 Před 4 lety +4

    Great. A very useful demo covering almost everything that we need to secure applications using Keycloak. Thanks a lot.

  • @DerMittelbrinker
    @DerMittelbrinker Před 3 lety

    A very good introduction and overview! Just what I was looking for to start with Keycloak! Vielen Dank!!

  • @krneki6954
    @krneki6954 Před 3 lety +3

    i love it how he pronounces single sign on as "sing a song"

  • @godwinkumah5664
    @godwinkumah5664 Před 4 lety

    Thank you very much. That was a great session

  • @hethcox2
    @hethcox2 Před 2 lety

    Great talk. Thanks, Thomas.

  • @chrisjasonmcqueen
    @chrisjasonmcqueen Před 4 lety

    Awesome Video! Very helpful content. You also did a great job explaining! Thank you!

  • @jonnyp
    @jonnyp Před 4 lety

    great info and very good demo! thanks thomas!

  • @yashaswiniyadagiri7732

    Great Demo!!!Learned a lot
    Requesiting for few more videos on keycloak with indepth explanation to expertise in keycloak

  • @RagdollRocket
    @RagdollRocket Před 4 lety

    Simply awesome. Thank you so much!

  • @deeptshukla5141
    @deeptshukla5141 Před rokem

    Thanks for summing up a lot of info within an hour!

  • @spattanaik75
    @spattanaik75 Před 3 lety +1

    Great demo ! Thanks

  • @ptdive
    @ptdive Před 2 lety +2

    Hello, thanks a lot for the great presentation. Just to add, if you want the ability to revoke Access Tokens before they expire, you can use the introspection endpoint instead of checking the signature.

  • @davidrojasgonzalez5534

    This looks awesome! Thank you!

  • @yifeifeng7150
    @yifeifeng7150 Před 2 lety

    Very informative tutorial. Many concepts are clearly explained. I played the video at the speed of 0.75x.

  • @MikeMitterer
    @MikeMitterer Před 4 lety

    Great talk! Thanks

  • @sttue
    @sttue Před 3 lety

    Nice presentation.

  • @Lijukrks166
    @Lijukrks166 Před 3 lety

    Simply Awesome

  • @Naren061982
    @Naren061982 Před 2 lety

    Spectacular Demo

  • @rezakh
    @rezakh Před 2 lety

    Awesome product.

  • @LoginALee
    @LoginALee Před 2 lety

    Quite amazing!

  • @H4R5Games
    @H4R5Games Před 4 lety

    Great Demo!!

  • @Metaspace2
    @Metaspace2 Před rokem

    Great talk!

  • @misterndiaye1286
    @misterndiaye1286 Před 10 měsíci

    that's realy great

  • @akshaygupta7449
    @akshaygupta7449 Před 2 lety

    Thanks for the useful video. I am facing configuring public IP addresses on keycloak. would you mind telling if any specific configuration needs to be noted?

  • @mackyin
    @mackyin Před 3 lety

    Do we need to define security constraint in application.yml?

  • @themusic9131
    @themusic9131 Před 3 lety

    Can we add into the access token, the location of the original request? Like, the application where the login was initiated from?

  • @AaronMartinColby
    @AaronMartinColby Před 4 lety

    For anyone curious as to why they cannot find Keycloak Gatekeeper anymore, it was moved out of the Keycloak governance group earlier in 2020. Details can be found here: groups.google.com/forum/#!topic/keycloak-dev/oDyw94BWxM0

  • @PieJee1
    @PieJee1 Před rokem

    Keycloak helped us in our application. The only downside i have seen is that there are many options and you need good jargon knowledge.

  • @titobundy
    @titobundy Před 3 lety

    Thanks, great demo. I have a question, I've my react-front and back-spring-api securized with keycloak. Why when I logout from react-app or close all session in keycloak admin console before that the token expire, I still can call rest api backend using the previous token generated at login moment (postman)?
    *backend-spring-api config*
    _"client-id": "my-public-client",_
    _"bearer-only": true,_
    _"auth-server-url": "localhost:8180/auth",_
    _"realm": "my-realm"_

    • @paulo_tdk
      @paulo_tdk Před 3 lety +1

      Hi! I see it's been a while, but for those with the same question:
      So, when a user logs out in the browser the JWT it uses isn't really invalidated, it's just removed from the browser's memory. When we are talking about a client like Postman, this means nothing, and the jwt will remains valid until it's expiration. To circumvent, you could shorten the expiration or implement in backend a verification of valid/invalid sessions

  • @nitishcygrp1751
    @nitishcygrp1751 Před 3 lety

    Let's say it's an Order API and I want to see only my Order and I should not have access to modify my Order. However, a Sales Agent can.
    Is it possible using keycloak?

  • @amitpadgaonkar8830
    @amitpadgaonkar8830 Před 6 měsíci

    Where can I find the slides?

  • @raghu11220
    @raghu11220 Před 4 lety

    hi, you are doing great job, if posible please make tutorilas on flask keycloak integration.. thank you

  • @teckyify
    @teckyify Před rokem

    Unfortunately this is the old keycloak version. Many things have changed, especially the UI.

  • @teckyify
    @teckyify Před rokem

    Right?

  • @random_act
    @random_act Před 2 lety

    noice

  • @Ainigma
    @Ainigma Před 2 lety

    46:55 "Zack" hehe

  • @SalvatorePellitteri
    @SalvatorePellitteri Před 3 lety +1

    Great! Really impressive! Now rewrite it in golang! Basically every application I am dealing with need this functionality the problem is jboss, Jboss, or any other "container", it is orrible I dont wanna have it around never, at least rewrite it to run without jboss and will be ok for me.

    • @EirikRye
      @EirikRye Před 2 lety +2

      Looking forward to your pull request

  • @buildingphase9712
    @buildingphase9712 Před 2 lety

    Bye bye Auth0