YoVDO

Guide to Authentication and Authorization for Cloud Native Applications with Keycloak

Offered By: Linux Foundation via YouTube

Tags

Keycloak Courses Kubernetes Courses Microservices Courses OAuth 2.0 Courses Authorization Courses Single-Sign-On Courses IoT security Courses Cloud-Native Applications Courses Identity and Access Management Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore authentication and authorization for cloud native applications using Keycloak in this informative 34-minute video presentation by Michito Okai from Hitachi, Ltd. Learn how to mitigate security risks such as Broken Access Control and Broken Authentication in cloud-native environments. Discover the benefits of Keycloak, an Identity and Access Management open-source software that joined CNCF as an incubating project. Understand how Keycloak enables Single Sign-On, passwordless authentication, and social login for administrators and users. Gain insights into Keycloak's adherence to OAuth 2.0 and highly secured profiles like Financial-grade API for microservices. Explore use cases for implementing authorization using IoT devices with Kubernetes through Keycloak. Delve into why Keycloak is becoming a preferred choice for authentication and authorization in cloud-native applications.

Syllabus

Guide of Authentication and Authorization for Cloud Native Applications with Keycloak - Michito Okai


Taught by

Linux Foundation

Tags

Related Courses

DEV202.2x: Building Cloud Apps with Microsoft Azure – Part 2
Microsoft via edX
Planning and Preparing SharePoint Hybrid
Microsoft via edX
Access Controls
(ISC)² via Coursera
Microsoft Azure Security Technologies (AZ-500) Cert Prep: 1 Manage Identity and Access
LinkedIn Learning
Microsoft Cybersecurity Stack: Advanced Identity and Endpoint Protection
LinkedIn Learning