YoVDO

Implementing Transaction Tokens with Keycloak for API Request Authentication

Offered By: CNCF [Cloud Native Computing Foundation] via YouTube

Tags

Cloud Security Courses Access Management Courses Cloud-Native Architecture Courses Keycloak Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the implementation of Transaction Tokens with Keycloak in this informative conference talk. Delve into the best practices for authenticating API requests using OAuth2 access tokens and learn about the importance of verifying the "audience" to prevent Token Redirect attacks. Discover how Transaction Tokens, utilizing OAuth2 Token Exchange, can help identify call chains in cloud-native architectures with numerous internal workloads. Gain insights into the potential of Keycloak, an open-source Identity and Access Management solution, to support Transaction Token services. Understand the overview of Transaction Tokens and their practical implementation using Keycloak to enhance security in complex cloud environments.

Syllabus

How Does a Workload Authenticate an API Request?: Implementing Transaction Token... Yoshiyuki Tabata


Taught by

CNCF [Cloud Native Computing Foundation]

Related Courses

OAuth 2.0 in Spring Boot Applications
Udemy
Middleware Security - Authentication, Authorization, and Auditing Services
Red Hat via YouTube
Building an Effective Identity and Access Management Architecture with Keycloak
Devoxx via YouTube
How to Secure Your Spring Apps with Keycloak
Devoxx via YouTube
Easily Secure and Add Identity Management to Your Spring Boot Applications
Devoxx via YouTube