English | Size: 1.72 GB
Genre: eLearning
Single Sign On (SSO) with Keycloak. Learn Identity and Access Management (IAM)
What you’ll learn
Understand the benefits of using keycloak in our full-stack application
How to Install keycloak on various OS ?
How to use keycloak and the various functionality it is offering ?
Authentication & Authorization with Keycloak
Using Keycloak RestAPIs
Extending Keycloak: Creating Keycloak Custom Templates
Keycloak Integration with FastAPI as a backend application
Keycloak Integration with React as a frontend application
In this course, you will learn Keycloak, an open-source software product that allows single sign-on with Identity and Access Management aimed at modern applications.
Keycloak is an open-source tool that provides identity and access management for web applications and services. It supports standard protocols such as OpenID Connect, OAuth 2.0, and SAML 2.0, and offers features such as single sign-on, user federation, social login, and authorization policies. Here are some possible use cases for Keycloak:
1. Secure microservices and APIs: Keycloak can be used to secure microservices and APIs by providing authentication and access control based on standard protocols like OpenID Connect and OAuth 2.0. This ensures that only authorized users and applications can access your services, helping to maintain the security and integrity of your infrastructure.
2. Integrate with external identity providers: Keycloak can act as an identity broker that allows users to authenticate with external identity providers, such as Google, Facebook, or LDAP. This simplifies the user experience and reduces the need to manage multiple user accounts and passwords. Keycloak can also synchronize user data and attributes from external sources, and map them to roles and groups within Keycloak.
3. Customize and extend Keycloak: Keycloak is highly configurable and extensible, allowing you to customize its look and feel, add new features, and integrate with other systems. You can use themes, templates, and internationalization to change the appearance of Keycloak’s user interface. You can also use extensions, such as SPIs, event listeners, and user storage providers, to add new functionality and logic to Keycloak. You can also use REST APIs and an admin console to manage Keycloak programmatically.
Who this course is for:
Cyber Security Expert
Backend Developers
Full-Stack Developers
Python Developers
rapidgator.net/file/a6b99ad8f0b662ab1d3a712bd28862e8/Keycloak-SSOCoursefromZerotoHero.part1.rar.html
rapidgator.net/file/49880363eb8b5653d5680b32c866bf67/Keycloak-SSOCoursefromZerotoHero.part2.rar.html
rapidgator.net/file/bf51ae072bd57b0acb8d04d00c688c8b/Keycloak-SSOCoursefromZerotoHero.part3.rar.html
rapidgator.net/file/fd36fbc4b9932b67ac2a07f13c6c91fe/Keycloak-SSOCoursefromZerotoHero.part4.rar.html
rapidgator.net/file/42408422519d4f01aff589baba9aee0d/Keycloak-SSOCoursefromZerotoHero.part5.rar.html
tbit.to/gbu2cyh20fhg/Keycloak-SSOCoursefromZerotoHero.part1.rar.html
tbit.to/mvv6dhexrjtd/Keycloak-SSOCoursefromZerotoHero.part2.rar.html
tbit.to/gycnp7j9nals/Keycloak-SSOCoursefromZerotoHero.part3.rar.html
tbit.to/lgpqp55ism4z/Keycloak-SSOCoursefromZerotoHero.part4.rar.html
tbit.to/wpml1v3dlj88/Keycloak-SSOCoursefromZerotoHero.part5.rar.html
If any links die or problem unrar, send request to
forms.gle/e557HbjJ5vatekDV9