Guide to Authentication and Authorization for Cloud Native Applications with Keycloak
Offered By: Linux Foundation via YouTube
Course Description
Overview
Explore authentication and authorization for cloud native applications using Keycloak in this informative 34-minute video presentation by Michito Okai from Hitachi, Ltd. Learn how to mitigate security risks such as Broken Access Control and Broken Authentication in cloud-native environments. Discover the benefits of Keycloak, an Identity and Access Management open-source software that joined CNCF as an incubating project. Understand how Keycloak enables Single Sign-On, passwordless authentication, and social login for administrators and users. Gain insights into Keycloak's adherence to OAuth 2.0 and highly secured profiles like Financial-grade API for microservices. Explore use cases for implementing authorization using IoT devices with Kubernetes through Keycloak. Delve into why Keycloak is becoming a preferred choice for authentication and authorization in cloud-native applications.
Syllabus
Guide of Authentication and Authorization for Cloud Native Applications with Keycloak - Michito Okai
Taught by
Linux Foundation
Tags
Related Courses
Authentication & Authorization: OAuthUdacity Networking and Security in iOS Applications
University of California, Irvine via Coursera AWS Lambda & Serverless Architecture Bootcamp (Build 5 Apps)
Udemy Learn OAuth 2.0 - Get started as an API Security Expert
Udemy Cloud Developer using Microsoft Azure
Microsoft via Udacity