JSFoo Pune 2019

JSFoo is a JavaScript conference hosted by HasGeek.

Tickets

Building secure applications with keycloak (OIDC/JWT)

Submitted by Abhishek koserwal (@akoserwal) on Saturday, 22 September 2018


Preview video

Section: Full talk Technical level: Intermediate

View proposal in schedule

Abstract

Building an enterprise level single sign-on application with the help of keycloak (Open Source Identity and Access Management).
And understanding the way to secure your application; frontend & backend API’s. Managing user federation with minimum configuration.

Outline

Overview to Keycloak (Open Source Identity and Access Management)
- Concepts: realm, client ID configuration, OIDC/SAML, security etc - Keycloak adapters (which & why?) - Understanding Json Web Token (JWT). - Integrating frontend(Angular/React) with keycloak adapter. - JWT Validation at backend & securing API end-points - Access token/refresh token

Speaker bio

I am Abhishek Koserwal, working as full-stack engineer at Redhat. Building full-stack applications (angular/react, spring-boot) based on principles of cloud native container design principles on Openshift platform. Invovles various redhat external/internal business application. We heavily use keycloak for securing our enterprise applications & implemented in production application.

https://www.linkedin.com/in/abhishekkoserwal/ https://github.com/akoserwal

Slides

https://www.slideshare.net/AbhishekKoserwal1/building-secure-applications-with-keycloak

Preview video

https://vimeo.com/292471786

Comments

  • Zainab Bawa (@zainabbawa) a year ago

    Abhishek, share draft slides and preview video for this proposal by 5 October.

    • Abhishek koserwal (@akoserwal) Proposer a year ago

      @zainabbawa: Uploaded draft slides.

  • Zainab Bawa (@zainabbawa) a year ago

    Add preview video, Abhishek.

  • Abhishek koserwal (@akoserwal) Proposer a year ago
  • Boris Stone (@wyvajukysa) a month ago

    Applications are the quick and active way to make the quality update in the system and file for multi tasking. The article is for the building of secure applications like the others do in https://www.topaperwritingservices.com/review-boomessays-com/ for the essay making and preparation well in the united and up stared ways.

  • Haseeb 13 days ago

    To ensure clients and information, application security has turned into a significant thought for organizations and incubators like <a href= “http://khaleejmag.com/business/best-startups-incubators-and-accelerator-in-the-world/” rel=”dofollow”>best startup incubators in the world </a> all inclusive. With regards to making and discharging an application, engineers should ceaselessly screen, fix and avert security vulnerabilities. To ensure clients and information, application security reality has turned into a <a href = “http://khaleejmag.com/education/the-positive-impact-of-augmented-reality-in-education/” rel=”dofollow”>augmented reality in Education</a> significant thought for organizations all inclusive. With regards to making and discharging an application, engineers should ceaselessly screen, fix and avert security vulnerabilities.

  • John White 10 days ago

    This looks very interesting, I haven’t done this before but the technology looks solid, I am might give it a go. Your instructions are clear and I love that you took the time to explain this in detail. I saw something on WritePass journal that would provide similar information and you can see their articles on http://writepass.com and their essay would provide more detail.

  • Saadia Ather 10 days ago

    Some quality information here with how to build applications with cloaking. I would recommend that we follow what this offers and share around. Good solid recommendation from http://bestmakeuplooks.com that you will find useful

Login with Twitter or Google to leave a comment