Retrieve external IDP tokens in Keycloak
Postgres Oauth2 authentication
Transient sessions in Keycloak : save your cache performances !
Keycloak.X in Kubernetes : deploy a cluster
Keycloak.x will become the reference soon.
According to the blog post, Keycloak 18 will not support Wildfly, after that no wildfly version… Now it is time to migrate !
We are still waiting for a Kubernetes operator with Keycloak.X, in this post we will see how to build your own cluster based on Keycloak.X 16.1.0
Keepass in the system tray with quick access
At please-open.it we use Keepass for passwords management. This simple and open source solution gives us entire satisfaction, only with a shared file on our internal cloud.
We tried to improve a lot the user experience by creating the simpliest passwords manager application.
UMA 2.0 from the begining : how to use it with bash
UMA 2.0 is known as a delegation of authorizations standard. Keycloak is fully compatible with UMA 2.0.
With a bash tool developped by please-open.it, let’s see how to use UMA 2.0
This article explains what is UMA 2.0 with an example using our new bash tool : uma-bash-client.sh
Device code flow in Keycloak
Action token for external user file download management
Actions tokens are a particular type of token that allows unauthenticated users to perform some limited and predefined actions.
In this article we will see how to use them to create authenticated download links with a simple and short PHP script intended to run on shared web hosting.
Authentication - feel the user experience
There are several methods for authentication : certificates, passwords, pincode, webauthn, One Time Password…
Choosing an authentication method is not a technical choice : it has hudge impacts on security but also on User eXperience.
This article shows several demos, built with Keycloak, and let you have a perception of User eXperience for each authentication method.