TOC training Keycloak RedhatSSO UMA

Pascal Flamand
Pascal FlamandFounder and CEO at JANUA - CEO at SemanticExperts

Table des matières du support de cours KeyCloak RedhatSSO UMA

Training KeyCloak - Redhat SSO UMA
May 2019
RH-SSO/Keycloak UMA training – Janua - Copyright 2004-2019 Page 1/3
Table des matières
1 History.............................................................................................................................................5
2 Using UMA and Keycloak..............................................................................................................6
2.1 Presentation – What is UMA ?.................................................................................................6
2.2 Pointers....................................................................................................................................6
2.3 UMA Key stakeholders............................................................................................................6
2.4 UMA workflow........................................................................................................................6
2.5 UMA typical use case..............................................................................................................8
2.6 Illustration of a RPT token (Request Party Token)..................................................................9
2.7 Illustration of a resource (Keycloak).....................................................................................10
2.8 Using permission...................................................................................................................11
2.9 Request approval or revokation.............................................................................................12
2.10 UMA with Keycloak – Improve application productivity...................................................12
3 UMA photoz keycloak example....................................................................................................13
3.1 Presentation............................................................................................................................13
3.2 Deploying uma photoz example............................................................................................13
3.2.1 Starting keycloak............................................................................................................13
3.2.2 Starting wildfly.............................................................................................................13
3.2.3 Deploy app-authz-uma-photoz example........................................................................13
3.2.4 Uploading uma-photoz config file.................................................................................14
3.3 Presentation of uma_photoz application................................................................................14
3.3.1 Uma_photoz architecture...............................................................................................15
3.3.2 Uma_photoz actions.......................................................................................................15
3.3.3 Uma_photoz policy........................................................................................................15
3.4 Photoz-restful-api application................................................................................................16
3.4.1 Photoz-restful-api settings..............................................................................................16
3.4.2 Photoz-restful-api Resources.........................................................................................17
3.4.3 Authorization scopes......................................................................................................19
3.4.4 Policies...........................................................................................................................19
3.4.5 Permission......................................................................................................................21
Scope base permission..............................................................................................................22
3.5 UMA-Photoz Lifecycle..........................................................................................................22
3.5.1 after login.......................................................................................................................22
3.5.2 listing resource created...................................................................................................23
3.5.3 Sharing Resource...........................................................................................................23
3.5.4 Listing Resources of Alice.............................................................................................24
3.5.5 Logging as Jdoe.............................................................................................................24
3.6 Request Approbation Lifecycle.............................................................................................25
3.6.1 Pending approval request...............................................................................................25
3.6.2 Request revokation.........................................................................................................25
4 Accessing UMA through REST API.............................................................................................26
4.1 Presentation............................................................................................................................26
4.2 Scenarios................................................................................................................................26
4.3 scripts used.............................................................................................................................27
4.3.1 access_token...................................................................................................................27
4.3.2 UMA ticket request........................................................................................................27
4.3.3 RPT token request (no persistence permission).............................................................27
4.3.4 RPT token request (persisting permission)....................................................................27
4.3.5 UMA access using RPT.................................................................................................27
4.4 Scenario1...............................................................................................................................28
RH-SSO/Keycloak UMA training – Janua - Copyright 2004-2019 Page 2/3
4.4.1 Reminder of (1) alice has created an album alice3........................................................28
4.4.2 (6) Jdoe can access to the resourcethe scenario1...........................................................28
4.4.3 Step 1 – creation of Album alice1..................................................................................28
4.4.4 Step2 creation of an RPT for Alice................................................................................28
4.5 Scenario2...............................................................................................................................33
4.5.1 Reminder........................................................................................................................33
4.6 Listing all the resources.........................................................................................................39
4.6.1 Resource_set endpoint...................................................................................................39
4.6.2 PAT token (Protected access token)...............................................................................39
4.6.3 Listing all the resources.................................................................................................39
4.6.4 Listing/zooming a particular resource............................................................................40
4.6.5 Creation of a new resources...........................................................................................41
4.7 Using permissions..................................................................................................................41
4.7.1 step 1 - Jdoe trying to access A4 (403 - access unauthorized).......................................41
4.7.2 A4 - Jdoe pending approval (alice action)......................................................................42
4.7.3 Approving a pending request using REST API..............................................................42
4.7.4 Revoking access to a resource........................................................................................43
4.7.5 Listing all permissions...................................................................................................44
4.8 Pointers..................................................................................................................................45
RH-SSO/Keycloak UMA training – Janua - Copyright 2004-2019 Page 3/3

Recommended

TOC training KeyCloak Redhat SSO core by
TOC training KeyCloak Redhat SSO coreTOC training KeyCloak Redhat SSO core
TOC training KeyCloak Redhat SSO corePascal Flamand
1.8K views7 slides
TOC training Keycloak RedhatSSO advanced by
TOC training Keycloak RedhatSSO advancedTOC training Keycloak RedhatSSO advanced
TOC training Keycloak RedhatSSO advancedPascal Flamand
943 views5 slides
Forguncy stepup by
Forguncy stepupForguncy stepup
Forguncy stepupフォーガンシー
2.1K views47 slides
rapportDigital-TV by
rapportDigital-TVrapportDigital-TV
rapportDigital-TVahmed oumezzine
3.7K views77 slides
MySQL Monitoring using Prometheus & Grafana by
MySQL Monitoring using Prometheus & GrafanaMySQL Monitoring using Prometheus & Grafana
MySQL Monitoring using Prometheus & GrafanaYoungHeon (Roy) Kim
4.3K views45 slides
Forguncy stepup v3v4 by
Forguncy  stepup v3v4Forguncy  stepup v3v4
Forguncy stepup v3v4フォーガンシー
7.6K views50 slides

More Related Content

What's hot

Toyota 8TB50 Pallet Truck Service Repair Manual by
Toyota 8TB50 Pallet Truck Service Repair ManualToyota 8TB50 Pallet Truck Service Repair Manual
Toyota 8TB50 Pallet Truck Service Repair Manualuhjekm ioelpoe
2.6K views46 slides
ELK stack introduction by
ELK stack introduction ELK stack introduction
ELK stack introduction abenyeung1
37 views60 slides
Grafana.pptx by
Grafana.pptxGrafana.pptx
Grafana.pptxBhushan Rane
1.3K views10 slides
Excise For Manufacturers In Tally Erp 9 by
Excise For Manufacturers In Tally Erp 9Excise For Manufacturers In Tally Erp 9
Excise For Manufacturers In Tally Erp 9ravi78
9.8K views140 slides
Manual de Programación SAM4S SPS530 v0.99o by
Manual de Programación SAM4S SPS530 v0.99oManual de Programación SAM4S SPS530 v0.99o
Manual de Programación SAM4S SPS530 v0.99oPCMIRA - ECR&POS
4K views145 slides
Grafana by
GrafanaGrafana
GrafanaNoelMc Grath
5.3K views14 slides

What's hot(20)

Toyota 8TB50 Pallet Truck Service Repair Manual by uhjekm ioelpoe
Toyota 8TB50 Pallet Truck Service Repair ManualToyota 8TB50 Pallet Truck Service Repair Manual
Toyota 8TB50 Pallet Truck Service Repair Manual
uhjekm ioelpoe2.6K views
ELK stack introduction by abenyeung1
ELK stack introduction ELK stack introduction
ELK stack introduction
abenyeung137 views
Excise For Manufacturers In Tally Erp 9 by ravi78
Excise For Manufacturers In Tally Erp 9Excise For Manufacturers In Tally Erp 9
Excise For Manufacturers In Tally Erp 9
ravi789.8K views
Manual de Programación SAM4S SPS530 v0.99o by PCMIRA - ECR&POS
Manual de Programación SAM4S SPS530 v0.99oManual de Programación SAM4S SPS530 v0.99o
Manual de Programación SAM4S SPS530 v0.99o
PCMIRA - ECR&POS4K views
[2019] 바르게, 빠르게! Reactive를 품은 Spring Kafka by NHN FORWARD
[2019] 바르게, 빠르게! Reactive를 품은 Spring Kafka[2019] 바르게, 빠르게! Reactive를 품은 Spring Kafka
[2019] 바르게, 빠르게! Reactive를 품은 Spring Kafka
NHN FORWARD1K views
Service Tax In Tally Erp 9 by ravi78
Service Tax In Tally Erp 9Service Tax In Tally Erp 9
Service Tax In Tally Erp 9
ravi7843K views
[오픈소스컨설팅]Day #2 MySQL Tuning, Replication, Cluster by Ji-Woong Choi
[오픈소스컨설팅]Day #2 MySQL Tuning, Replication, Cluster[오픈소스컨설팅]Day #2 MySQL Tuning, Replication, Cluster
[오픈소스컨설팅]Day #2 MySQL Tuning, Replication, Cluster
Ji-Woong Choi6.1K views
PROYECTO ASIR - Clúster de Alta Disponibilidad en Proxmox VE 4.4 by Guillermo Moral Moreno
PROYECTO ASIR - Clúster de Alta Disponibilidad en Proxmox VE 4.4PROYECTO ASIR - Clúster de Alta Disponibilidad en Proxmox VE 4.4
PROYECTO ASIR - Clúster de Alta Disponibilidad en Proxmox VE 4.4
Índice del libro: "Open Source INTelligence (OSINT): Investigar personas e Id... by Telefónica
Índice del libro: "Open Source INTelligence (OSINT): Investigar personas e Id...Índice del libro: "Open Source INTelligence (OSINT): Investigar personas e Id...
Índice del libro: "Open Source INTelligence (OSINT): Investigar personas e Id...
Telefónica2.8K views
Explore your prometheus data in grafana - Promcon 2018 by Grafana Labs
Explore your prometheus data in grafana - Promcon 2018Explore your prometheus data in grafana - Promcon 2018
Explore your prometheus data in grafana - Promcon 2018
Grafana Labs1.6K views
How to Build an Effective API Security Strategy by Nordic APIs
How to Build an Effective API Security StrategyHow to Build an Effective API Security Strategy
How to Build an Effective API Security Strategy
Nordic APIs748 views
Catalogo hydra deca by mglatts
Catalogo hydra decaCatalogo hydra deca
Catalogo hydra deca
mglatts12.6K views
Novena de la Prosperidad by e-spiritusanto
Novena de la ProsperidadNovena de la Prosperidad
Novena de la Prosperidad
e-spiritusanto84.9K views
Distributed tracing using open tracing & jaeger 2 by Chandresh Pancholi
Distributed tracing using open tracing & jaeger 2Distributed tracing using open tracing & jaeger 2
Distributed tracing using open tracing & jaeger 2
Chandresh Pancholi808 views
Ford Fusion 2010 руководство по эксплуатации ava-avto.ru by ava-rez
Ford Fusion 2010 руководство по эксплуатации ava-avto.ruFord Fusion 2010 руководство по эксплуатации ava-avto.ru
Ford Fusion 2010 руководство по эксплуатации ava-avto.ru
ava-rez6.7K views
Clickhouse at Cloudflare. By Marek Vavrusa by Altinity Ltd
Clickhouse at Cloudflare. By Marek VavrusaClickhouse at Cloudflare. By Marek Vavrusa
Clickhouse at Cloudflare. By Marek Vavrusa
Altinity Ltd2.5K views
Grafana introduction by Rico Chen
Grafana introductionGrafana introduction
Grafana introduction
Rico Chen8.7K views

Similar to TOC training Keycloak RedhatSSO UMA

App designprocess(yukijiang) by
App designprocess(yukijiang)App designprocess(yukijiang)
App designprocess(yukijiang)Xue Jiang
1K views84 slides
Ppdg Robust File Replication by
Ppdg Robust File ReplicationPpdg Robust File Replication
Ppdg Robust File Replicationguest0dc8a2
214 views15 slides
Course lab 2_guide_eng by
Course lab 2_guide_engCourse lab 2_guide_eng
Course lab 2_guide_engياسر عبد العزيز
96 views250 slides
Course lab 2_guide_eng by
Course lab 2_guide_engCourse lab 2_guide_eng
Course lab 2_guide_engtameranwaralzohairy
2.1K views250 slides
Icp by
IcpIcp
IcpMichael Schmidt
464 views287 slides
Gate coaching in chandigarh by
Gate coaching in chandigarhGate coaching in chandigarh
Gate coaching in chandigarhgatenetworks
818 views83 slides

Similar to TOC training Keycloak RedhatSSO UMA(20)

App designprocess(yukijiang) by Xue Jiang
App designprocess(yukijiang)App designprocess(yukijiang)
App designprocess(yukijiang)
Xue Jiang1K views
Ppdg Robust File Replication by guest0dc8a2
Ppdg Robust File ReplicationPpdg Robust File Replication
Ppdg Robust File Replication
guest0dc8a2214 views
Gate coaching in chandigarh by gatenetworks
Gate coaching in chandigarhGate coaching in chandigarh
Gate coaching in chandigarh
gatenetworks818 views
Tellurium 0.6.0 User Guide by John.Jian.Fang
Tellurium 0.6.0 User GuideTellurium 0.6.0 User Guide
Tellurium 0.6.0 User Guide
John.Jian.Fang1.3K views
Report-Bilong&Jing-final by Jing KE
Report-Bilong&Jing-finalReport-Bilong&Jing-final
Report-Bilong&Jing-final
Jing KE113 views
NX9 for Engineering Design by Nam Hoai
NX9 for Engineering DesignNX9 for Engineering Design
NX9 for Engineering Design
Nam Hoai1.1K views
Protective Device Coordination by joeengi
Protective Device CoordinationProtective Device Coordination
Protective Device Coordination
joeengi12.2K views
Virtual Classroom System for Women`s University in Africa by tarrie chagwiza
Virtual Classroom System for Women`s University in AfricaVirtual Classroom System for Women`s University in Africa
Virtual Classroom System for Women`s University in Africa
tarrie chagwiza100 views
TOC training Keycloak RedhatSSO advanced by Pascal Flamand
TOC training Keycloak RedhatSSO advancedTOC training Keycloak RedhatSSO advanced
TOC training Keycloak RedhatSSO advanced
Pascal Flamand780 views
Manual tutorial-spring-java by sagicar
Manual tutorial-spring-javaManual tutorial-spring-java
Manual tutorial-spring-java
sagicar1.1K views
Spring Reference by asas
Spring ReferenceSpring Reference
Spring Reference
asas2.4K views
BizTalk Practical Course Preview by MoustafaRefaat
BizTalk Practical Course PreviewBizTalk Practical Course Preview
BizTalk Practical Course Preview
MoustafaRefaat1.1K views
cloudscaleenvironment-userguide_1_1 (1) by Jure Polutnik
cloudscaleenvironment-userguide_1_1 (1)cloudscaleenvironment-userguide_1_1 (1)
cloudscaleenvironment-userguide_1_1 (1)
Jure Polutnik105 views

More from Pascal Flamand

Start14 french tech startuffe nation by
Start14 french tech startuffe nationStart14 french tech startuffe nation
Start14 french tech startuffe nationPascal Flamand
35 views2 slides
Article "Un an de télétravail et de COVID" dans le magazine Start by
Article "Un an de télétravail et de COVID" dans le magazine StartArticle "Un an de télétravail et de COVID" dans le magazine Start
Article "Un an de télétravail et de COVID" dans le magazine StartPascal Flamand
77 views2 slides
Article "La tyrannie du risque zéro" dans le magazine Start by
Article "La tyrannie du risque zéro" dans le magazine StartArticle "La tyrannie du risque zéro" dans le magazine Start
Article "La tyrannie du risque zéro" dans le magazine StartPascal Flamand
69 views2 slides
Article "quand les licornes voleront..." dans le magazine Start by
Article "quand les licornes voleront..." dans le magazine StartArticle "quand les licornes voleront..." dans le magazine Start
Article "quand les licornes voleront..." dans le magazine StartPascal Flamand
73 views2 slides
Article sur "Le temps des c(e)rises" dans le magazine Start by
Article sur "Le temps des c(e)rises" dans le magazine StartArticle sur "Le temps des c(e)rises" dans le magazine Start
Article sur "Le temps des c(e)rises" dans le magazine StartPascal Flamand
79 views2 slides
Article sur l'Agilité dans le magazine Start by
Article sur l'Agilité dans le magazine StartArticle sur l'Agilité dans le magazine Start
Article sur l'Agilité dans le magazine StartPascal Flamand
68 views2 slides

More from Pascal Flamand(20)

Start14 french tech startuffe nation by Pascal Flamand
Start14 french tech startuffe nationStart14 french tech startuffe nation
Start14 french tech startuffe nation
Pascal Flamand35 views
Article "Un an de télétravail et de COVID" dans le magazine Start by Pascal Flamand
Article "Un an de télétravail et de COVID" dans le magazine StartArticle "Un an de télétravail et de COVID" dans le magazine Start
Article "Un an de télétravail et de COVID" dans le magazine Start
Pascal Flamand77 views
Article "La tyrannie du risque zéro" dans le magazine Start by Pascal Flamand
Article "La tyrannie du risque zéro" dans le magazine StartArticle "La tyrannie du risque zéro" dans le magazine Start
Article "La tyrannie du risque zéro" dans le magazine Start
Pascal Flamand69 views
Article "quand les licornes voleront..." dans le magazine Start by Pascal Flamand
Article "quand les licornes voleront..." dans le magazine StartArticle "quand les licornes voleront..." dans le magazine Start
Article "quand les licornes voleront..." dans le magazine Start
Pascal Flamand73 views
Article sur "Le temps des c(e)rises" dans le magazine Start by Pascal Flamand
Article sur "Le temps des c(e)rises" dans le magazine StartArticle sur "Le temps des c(e)rises" dans le magazine Start
Article sur "Le temps des c(e)rises" dans le magazine Start
Pascal Flamand79 views
Article sur l'Agilité dans le magazine Start by Pascal Flamand
Article sur l'Agilité dans le magazine StartArticle sur l'Agilité dans le magazine Start
Article sur l'Agilité dans le magazine Start
Pascal Flamand68 views
Article sur l'IA dans le magazine Start by Pascal Flamand
Article sur l'IA dans le magazine StartArticle sur l'IA dans le magazine Start
Article sur l'IA dans le magazine Start
Pascal Flamand78 views
Article sur la Smart City dans le magazine Start by Pascal Flamand
Article sur la Smart City dans le magazine StartArticle sur la Smart City dans le magazine Start
Article sur la Smart City dans le magazine Start
Pascal Flamand84 views
Article sur les Startup dans le magazine Start by Pascal Flamand
Article sur les Startup dans le magazine StartArticle sur les Startup dans le magazine Start
Article sur les Startup dans le magazine Start
Pascal Flamand73 views
TOC training KeyCloak Redhat SSO core by Pascal Flamand
TOC training KeyCloak Redhat SSO coreTOC training KeyCloak Redhat SSO core
TOC training KeyCloak Redhat SSO core
Pascal Flamand1.3K views
Article sur les Pitchs dans le magazine Start by Pascal Flamand
Article sur les Pitchs dans le magazine StartArticle sur les Pitchs dans le magazine Start
Article sur les Pitchs dans le magazine Start
Pascal Flamand74 views
Article sur la Transformation Digitale dans le Magazine Start by Pascal Flamand
Article sur la Transformation Digitale dans le Magazine StartArticle sur la Transformation Digitale dans le Magazine Start
Article sur la Transformation Digitale dans le Magazine Start
Pascal Flamand58 views
Article sur l'IA dans le magazine Start by Pascal Flamand
Article sur l'IA dans le magazine StartArticle sur l'IA dans le magazine Start
Article sur l'IA dans le magazine Start
Pascal Flamand53 views
Tribune paca jaguards 12.12.18 by Pascal Flamand
Tribune paca jaguards 12.12.18Tribune paca jaguards 12.12.18
Tribune paca jaguards 12.12.18
Pascal Flamand910 views
Partenariat Jaguards - Busit by Pascal Flamand
Partenariat Jaguards - BusitPartenariat Jaguards - Busit
Partenariat Jaguards - Busit
Pascal Flamand331 views
La tribune ce que booster apporte à semantic experts by Pascal Flamand
La tribune   ce que booster apporte à semantic expertsLa tribune   ce que booster apporte à semantic experts
La tribune ce que booster apporte à semantic experts
Pascal Flamand2.8K views
OPENAM 13.5 - Core Token Service by Pascal Flamand
OPENAM 13.5 - Core Token ServiceOPENAM 13.5 - Core Token Service
OPENAM 13.5 - Core Token Service
Pascal Flamand1.1K views
La tribune Jaguards juillet 2017 by Pascal Flamand
La tribune Jaguards juillet 2017La tribune Jaguards juillet 2017
La tribune Jaguards juillet 2017
Pascal Flamand663 views
Rapport d'activité Telecom Valley 2016 by Pascal Flamand
Rapport d'activité Telecom Valley 2016Rapport d'activité Telecom Valley 2016
Rapport d'activité Telecom Valley 2016
Pascal Flamand312 views

Recently uploaded

Serverless cloud architecture patterns by
Serverless cloud architecture patternsServerless cloud architecture patterns
Serverless cloud architecture patternsJimmy Dahlqvist
17 views52 slides
google forms survey (1).pptx by
google forms survey (1).pptxgoogle forms survey (1).pptx
google forms survey (1).pptxMollyBrown86
14 views10 slides
Opportunities for Youth in IG - Alena Muravska RIPE NCC.pdf by
Opportunities for Youth in IG - Alena Muravska RIPE NCC.pdfOpportunities for Youth in IG - Alena Muravska RIPE NCC.pdf
Opportunities for Youth in IG - Alena Muravska RIPE NCC.pdfRIPE NCC
9 views12 slides
PORTFOLIO 1 (Bret Michael Pepito).pdf by
PORTFOLIO 1 (Bret Michael Pepito).pdfPORTFOLIO 1 (Bret Michael Pepito).pdf
PORTFOLIO 1 (Bret Michael Pepito).pdfbrejess0410
7 views6 slides
IETF 118: Starlink Protocol Performance by
IETF 118: Starlink Protocol PerformanceIETF 118: Starlink Protocol Performance
IETF 118: Starlink Protocol PerformanceAPNIC
186 views22 slides
Building trust in our information ecosystem: who do we trust in an emergency by
Building trust in our information ecosystem: who do we trust in an emergencyBuilding trust in our information ecosystem: who do we trust in an emergency
Building trust in our information ecosystem: who do we trust in an emergencyTina Purnat
92 views18 slides

Recently uploaded(20)

Serverless cloud architecture patterns by Jimmy Dahlqvist
Serverless cloud architecture patternsServerless cloud architecture patterns
Serverless cloud architecture patterns
Jimmy Dahlqvist17 views
google forms survey (1).pptx by MollyBrown86
google forms survey (1).pptxgoogle forms survey (1).pptx
google forms survey (1).pptx
MollyBrown8614 views
Opportunities for Youth in IG - Alena Muravska RIPE NCC.pdf by RIPE NCC
Opportunities for Youth in IG - Alena Muravska RIPE NCC.pdfOpportunities for Youth in IG - Alena Muravska RIPE NCC.pdf
Opportunities for Youth in IG - Alena Muravska RIPE NCC.pdf
RIPE NCC9 views
PORTFOLIO 1 (Bret Michael Pepito).pdf by brejess0410
PORTFOLIO 1 (Bret Michael Pepito).pdfPORTFOLIO 1 (Bret Michael Pepito).pdf
PORTFOLIO 1 (Bret Michael Pepito).pdf
brejess04107 views
IETF 118: Starlink Protocol Performance by APNIC
IETF 118: Starlink Protocol PerformanceIETF 118: Starlink Protocol Performance
IETF 118: Starlink Protocol Performance
APNIC186 views
Building trust in our information ecosystem: who do we trust in an emergency by Tina Purnat
Building trust in our information ecosystem: who do we trust in an emergencyBuilding trust in our information ecosystem: who do we trust in an emergency
Building trust in our information ecosystem: who do we trust in an emergency
Tina Purnat92 views
IGF UA - Dialog with I_ organisations - Alena Muavska RIPE NCC.pdf by RIPE NCC
IGF UA - Dialog with I_ organisations - Alena Muavska RIPE NCC.pdfIGF UA - Dialog with I_ organisations - Alena Muavska RIPE NCC.pdf
IGF UA - Dialog with I_ organisations - Alena Muavska RIPE NCC.pdf
RIPE NCC15 views
We see everywhere that many people are talking about technology.docx by ssuserc5935b
We see everywhere that many people are talking about technology.docxWe see everywhere that many people are talking about technology.docx
We see everywhere that many people are talking about technology.docx
ssuserc5935b6 views
AI Powered event-driven translation bot by Jimmy Dahlqvist
AI Powered event-driven translation botAI Powered event-driven translation bot
AI Powered event-driven translation bot
Jimmy Dahlqvist16 views
Existing documentaries (1).docx by MollyBrown86
Existing documentaries (1).docxExisting documentaries (1).docx
Existing documentaries (1).docx
MollyBrown8613 views
𝐒𝐨𝐥𝐚𝐫𝐖𝐢𝐧𝐝𝐬 𝐂𝐚𝐬𝐞 𝐒𝐭𝐮𝐝𝐲 by Infosec train
𝐒𝐨𝐥𝐚𝐫𝐖𝐢𝐧𝐝𝐬 𝐂𝐚𝐬𝐞 𝐒𝐭𝐮𝐝𝐲𝐒𝐨𝐥𝐚𝐫𝐖𝐢𝐧𝐝𝐬 𝐂𝐚𝐬𝐞 𝐒𝐭𝐮𝐝𝐲
𝐒𝐨𝐥𝐚𝐫𝐖𝐢𝐧𝐝𝐬 𝐂𝐚𝐬𝐞 𝐒𝐭𝐮𝐝𝐲
Infosec train9 views

TOC training Keycloak RedhatSSO UMA

  • 1. Training KeyCloak - Redhat SSO UMA May 2019 RH-SSO/Keycloak UMA training – Janua - Copyright 2004-2019 Page 1/3
  • 2. Table des matières 1 History.............................................................................................................................................5 2 Using UMA and Keycloak..............................................................................................................6 2.1 Presentation – What is UMA ?.................................................................................................6 2.2 Pointers....................................................................................................................................6 2.3 UMA Key stakeholders............................................................................................................6 2.4 UMA workflow........................................................................................................................6 2.5 UMA typical use case..............................................................................................................8 2.6 Illustration of a RPT token (Request Party Token)..................................................................9 2.7 Illustration of a resource (Keycloak).....................................................................................10 2.8 Using permission...................................................................................................................11 2.9 Request approval or revokation.............................................................................................12 2.10 UMA with Keycloak – Improve application productivity...................................................12 3 UMA photoz keycloak example....................................................................................................13 3.1 Presentation............................................................................................................................13 3.2 Deploying uma photoz example............................................................................................13 3.2.1 Starting keycloak............................................................................................................13 3.2.2 Starting wildfly.............................................................................................................13 3.2.3 Deploy app-authz-uma-photoz example........................................................................13 3.2.4 Uploading uma-photoz config file.................................................................................14 3.3 Presentation of uma_photoz application................................................................................14 3.3.1 Uma_photoz architecture...............................................................................................15 3.3.2 Uma_photoz actions.......................................................................................................15 3.3.3 Uma_photoz policy........................................................................................................15 3.4 Photoz-restful-api application................................................................................................16 3.4.1 Photoz-restful-api settings..............................................................................................16 3.4.2 Photoz-restful-api Resources.........................................................................................17 3.4.3 Authorization scopes......................................................................................................19 3.4.4 Policies...........................................................................................................................19 3.4.5 Permission......................................................................................................................21 Scope base permission..............................................................................................................22 3.5 UMA-Photoz Lifecycle..........................................................................................................22 3.5.1 after login.......................................................................................................................22 3.5.2 listing resource created...................................................................................................23 3.5.3 Sharing Resource...........................................................................................................23 3.5.4 Listing Resources of Alice.............................................................................................24 3.5.5 Logging as Jdoe.............................................................................................................24 3.6 Request Approbation Lifecycle.............................................................................................25 3.6.1 Pending approval request...............................................................................................25 3.6.2 Request revokation.........................................................................................................25 4 Accessing UMA through REST API.............................................................................................26 4.1 Presentation............................................................................................................................26 4.2 Scenarios................................................................................................................................26 4.3 scripts used.............................................................................................................................27 4.3.1 access_token...................................................................................................................27 4.3.2 UMA ticket request........................................................................................................27 4.3.3 RPT token request (no persistence permission).............................................................27 4.3.4 RPT token request (persisting permission)....................................................................27 4.3.5 UMA access using RPT.................................................................................................27 4.4 Scenario1...............................................................................................................................28 RH-SSO/Keycloak UMA training – Janua - Copyright 2004-2019 Page 2/3
  • 3. 4.4.1 Reminder of (1) alice has created an album alice3........................................................28 4.4.2 (6) Jdoe can access to the resourcethe scenario1...........................................................28 4.4.3 Step 1 – creation of Album alice1..................................................................................28 4.4.4 Step2 creation of an RPT for Alice................................................................................28 4.5 Scenario2...............................................................................................................................33 4.5.1 Reminder........................................................................................................................33 4.6 Listing all the resources.........................................................................................................39 4.6.1 Resource_set endpoint...................................................................................................39 4.6.2 PAT token (Protected access token)...............................................................................39 4.6.3 Listing all the resources.................................................................................................39 4.6.4 Listing/zooming a particular resource............................................................................40 4.6.5 Creation of a new resources...........................................................................................41 4.7 Using permissions..................................................................................................................41 4.7.1 step 1 - Jdoe trying to access A4 (403 - access unauthorized).......................................41 4.7.2 A4 - Jdoe pending approval (alice action)......................................................................42 4.7.3 Approving a pending request using REST API..............................................................42 4.7.4 Revoking access to a resource........................................................................................43 4.7.5 Listing all permissions...................................................................................................44 4.8 Pointers..................................................................................................................................45 RH-SSO/Keycloak UMA training – Janua - Copyright 2004-2019 Page 3/3