[go: up one dir, main page]

Thorgersen et al., 2023 - Google Patents

Keycloak-Identity and Access Management for Modern Applications

Thorgersen et al., 2023

View PDF
Document ID
14449408503059799382
Author
Thorgersen S
Silva P
Publication year

External Links

Snippet

Keycloak - Page 1 Keycloak - Identity and Access Management for Modern Applications Harness the power of Keycloak, OpenID Connect, and OAuth 2.0 protocols to secure applications Stian Thorgersen | Pedro Igor Silva K e yclo ak - Id e n tity an d A cce ss Mana ge m …
Continue reading at sciendo.com (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/33User authentication using certificates
    • G06F21/335User authentication using certificates for accessing specific resources, e.g. using Kerberos tickets
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/41User authentication where a single sign-on provides access to a plurality of computers
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/44Program or device authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication
    • G06F21/46Structures or tools for the administration of authentication by designing passwords or checking the strength of passwords
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database

Similar Documents

Publication Publication Date Title
Thorgersen et al. Keycloak-Identity and Access Management for Modern Applications
US20210144213A1 (en) Application Customization
US9854063B2 (en) Enterprise application store for an orchestration framework for connected devices
Boyd Getting started with OAuth 2.0
US9690920B2 (en) Secure configuration catalog of trusted identity providers
WO2024205904A1 (en) Enabling sso for embedded applications
Knutson et al. Spring Security: Secure your web applications, RESTful services, and microservice architectures
Schwartz et al. SAML
Santos et al. Privacy–preserving identity federations in the cloud: a proof of concept
Mayank et al. Developing Applications with Azure Active Directory
Rising Microsoft 365 Security, Compliance, and Identity Administration: Plan and implement security and compliance strategies for Microsoft 365 and hybrid environments
Karzyński Webmin Administrator's Cookbook
Selvaraj Building RESTful APIs with Ruby on Rails
Nolan et al. Authentication for web services via OAuth
Archer et al. Cloud Native Data Security with OAuth: A Scalable Zero Trust Architecture
Nasslahsen Spring Security: Effectively secure your web apps, RESTful services, cloud apps, and microservice architectures
Schwartz et al. OpenID connect
Edge et al. Identity and Device Trust
Katamreddy et al. Securing Web Applications
Quashigah Implementing A Role-Based Authentication and Authorization System With. NET 9: A Case Study of HAMK Tech Research Unit’s FarmerApp Project
Wilson et al. Sample Application with Custom API
Bressoud et al. Authentication and Authorization
Ardanuy Comas Integrated Windows authentication in the Dassault Systèmes 3DExperience platform
Lee et al. Oracle Fusion Middleware Security Overview, 11g Release 1 (11.1. 1) E12889-03
Songprasop Integrated Single Sign-On System on Open Nebula