Thorgersen et al., 2023 - Google Patents
Keycloak-Identity and Access Management for Modern ApplicationsThorgersen et al., 2023
View PDF- Document ID
- 14449408503059799382
- Author
- Thorgersen S
- Silva P
- Publication year
External Links
Snippet
Keycloak - Page 1 Keycloak - Identity and Access Management for Modern Applications
Harness the power of Keycloak, OpenID Connect, and OAuth 2.0 protocols to secure
applications Stian Thorgersen | Pedro Igor Silva K e yclo ak - Id e n tity an d A cce ss Mana ge m …
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/33—User authentication using certificates
- G06F21/335—User authentication using certificates for accessing specific resources, e.g. using Kerberos tickets
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/41—User authentication where a single sign-on provides access to a plurality of computers
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/44—Program or device authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/577—Assessing vulnerabilities and evaluating computer system security
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/45—Structures or tools for the administration of authentication
- G06F21/46—Structures or tools for the administration of authentication by designing passwords or checking the strength of passwords
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Thorgersen et al. | Keycloak-Identity and Access Management for Modern Applications | |
US20210144213A1 (en) | Application Customization | |
US9854063B2 (en) | Enterprise application store for an orchestration framework for connected devices | |
Boyd | Getting started with OAuth 2.0 | |
US9690920B2 (en) | Secure configuration catalog of trusted identity providers | |
WO2024205904A1 (en) | Enabling sso for embedded applications | |
Knutson et al. | Spring Security: Secure your web applications, RESTful services, and microservice architectures | |
Schwartz et al. | SAML | |
Santos et al. | Privacy–preserving identity federations in the cloud: a proof of concept | |
Mayank et al. | Developing Applications with Azure Active Directory | |
Rising | Microsoft 365 Security, Compliance, and Identity Administration: Plan and implement security and compliance strategies for Microsoft 365 and hybrid environments | |
Karzyński | Webmin Administrator's Cookbook | |
Selvaraj | Building RESTful APIs with Ruby on Rails | |
Nolan et al. | Authentication for web services via OAuth | |
Archer et al. | Cloud Native Data Security with OAuth: A Scalable Zero Trust Architecture | |
Nasslahsen | Spring Security: Effectively secure your web apps, RESTful services, cloud apps, and microservice architectures | |
Schwartz et al. | OpenID connect | |
Edge et al. | Identity and Device Trust | |
Katamreddy et al. | Securing Web Applications | |
Quashigah | Implementing A Role-Based Authentication and Authorization System With. NET 9: A Case Study of HAMK Tech Research Unit’s FarmerApp Project | |
Wilson et al. | Sample Application with Custom API | |
Bressoud et al. | Authentication and Authorization | |
Ardanuy Comas | Integrated Windows authentication in the Dassault Systèmes 3DExperience platform | |
Lee et al. | Oracle Fusion Middleware Security Overview, 11g Release 1 (11.1. 1) E12889-03 | |
Songprasop | Integrated Single Sign-On System on Open Nebula |