5. Passwords for work (reality)
1 password for the "big company mail"
1 password for the "local service"
1 password to log in at customer
3 passwords to legacy service X Y and Z
7. Where passwords stay
LDAP / AD database
Plain text file
Database (hashed/salted?)
All kind of password managers
8. Where passwords go
End applications often know the password
Basic auth + http between frontend and
backend
LDAP app: bind with your user
17. OpenID Connect
Standard for authentication and authorization
Based around signed tokens
Adopted by major actors (public & private)
26. Access token / Refresh token
Access token grants access to ressources
Refresh token allows user to renew the access
token
27. What are claims?
Who you are
What you can do (groups, roles, ...)
No need to register in the your app first!
28. How is that "more" secure?
Password goes to a single app (idp)
Only claims get out of the idp
End application does not have your password
Token has short expiry
Keycloak allows easy audit and centralize
advanced auth mechanism
31. A Red Hat Open Source project
Identity and Access management
OpenID Connect support (but also saml 2.0)
32. What is Keycloak really
A java app
A Wildfly application server
(comes as a single package - batteries
included!)
34. Terminology
Realm: set of users, roles, clients, and groups
Client: a client application that will use
keycloak to authenticate users
idp: Identity Provider
37. Keycloak Gatekeeper
Not all applications support OpenID connect
Gatekeeper is a OIDC compatible reverse proxy