OSDC 2019 | Single Sign On with Keycloak: why and how by Julien Pivotto

NETWAYS
NETWAYSNETWAYS
Single Sign On with Keycloak
Julien Pivotto (@roidelapluie)
OSDC 2019
May 14th, 2019
@roidelapluie
I like Open Source
I like monitoring
I like automation
... and all of that is my daily job at inuits
inuits
Creative Commons Attribution 2.0
https://www.flickr.com/photos/30478819@N08/41858933990
Passwords for work (reality)
1 password for the "big company mail"
1 password for the "local service"
1 password to log in at customer
3 passwords to legacy service X Y and Z
OSDC 2019 | Single Sign On with Keycloak: why and how by Julien Pivotto
Where passwords stay
LDAP / AD database
Plain text file
Database (hashed/salted?)
All kind of password managers
Where passwords go
End applications often know the password
Basic auth + http between frontend and
backend
LDAP app: bind with your user
OSDC 2019 | Single Sign On with Keycloak: why and how by Julien Pivotto
OSDC 2019 | Single Sign On with Keycloak: why and how by Julien Pivotto
Why passwords
Simple
Legacy
?
Is there anything else?
PKI
2FA
Federation/SSO
Meanwhile...
Creative Commons Attribution 2.0 https://www.flickr.com/photos/ednawinti/25718417460/
Modern Security
requirements
(thanks GDPR)
Log all the access
Principle of least privilege
Revoking access
2FA
Creative Commons Attribution-ShareAlike 2.0
https://www.flickr.com/photos/doctorow/15507274056
IAM (simplified)
Identity: who am I
Access: what can I do
For people, machines, apps...
OpenID Connect
Standard for authentication and authorization
Based around signed tokens
Adopted by major actors (public & private)
OSDC 2019 | Single Sign On with Keycloak: why and how by Julien Pivotto
OSDC 2019 | Single Sign On with Keycloak: why and how by Julien Pivotto
OSDC 2019 | Single Sign On with Keycloak: why and how by Julien Pivotto
OSDC 2019 | Single Sign On with Keycloak: why and how by Julien Pivotto
OSDC 2019 | Single Sign On with Keycloak: why and how by Julien Pivotto
OSDC 2019 | Single Sign On with Keycloak: why and how by Julien Pivotto
OSDC 2019 | Single Sign On with Keycloak: why and how by Julien Pivotto
OSDC 2019 | Single Sign On with Keycloak: why and how by Julien Pivotto
Access token / Refresh token
Access token grants access to ressources
Refresh token allows user to renew the access
token
What are claims?
Who you are
What you can do (groups, roles, ...)
No need to register in the your app first!
How is that "more" secure?
Password goes to a single app (idp)
Only claims get out of the idp
End application does not have your password
Token has short expiry
Keycloak allows easy audit and centralize
advanced auth mechanism
Well known
https://accounts.google.com/.well-
known/openid-configuration
https://gitlab.com/.well-known/openid-
configuration
OSDC 2019 | Single Sign On with Keycloak: why and how by Julien Pivotto
A Red Hat Open Source project
Identity and Access management
OpenID Connect support (but also saml 2.0)
What is Keycloak really
A java app
A Wildfly application server
(comes as a single package - batteries
included!)
OSDC 2019 | Single Sign On with Keycloak: why and how by Julien Pivotto
Terminology
Realm: set of users, roles, clients, and groups
Client: a client application that will use
keycloak to authenticate users
idp: Identity Provider
OSDC 2019 | Single Sign On with Keycloak: why and how by Julien Pivotto
OSDC 2019 | Single Sign On with Keycloak: why and how by Julien Pivotto
Keycloak Gatekeeper
Not all applications support OpenID connect
Gatekeeper is a OIDC compatible reverse proxy
Identity Providers
Login with external sources (github, google,
gitlab, $COMPANY...)
Get claims back from them
OSDC 2019 | Single Sign On with Keycloak: why and how by Julien Pivotto
User federation
Connect Keycloak with LDAP, freeipa, kerberos...
Operations
Creative Commons Zero https://www.flickr.com/photos/freestocks/25668265836
Configuration
API
kcadm.sh
terraform provider
./bin/kcadm.sh config credentials 
--server http://localhost:8080/auth 
--realm master --user admin
./bin/kcadm.sh get users -r example
Data
Default to H2 (file database)
Pick something else for more availability
Audit
Enable auditing in DB
Log to file
<size-rotating-file-handler name="EVENTLOG"
autoflush="true">
<formatter>
<named-formatter name="json-formatter"/>
</formatter>
<file relative-to="jboss.server.log.dir"
path="events.log"/>
<rotate-size value="10M"/>
<max-backup-index value="5"/>
<append value="true"/>
</size-rotating-file-handler>
<logger category="org.keycloak.events">
<level name="DEBUG"/>
<handlers>
<handler name="EVENTLOG"/>
</handlers>
</logger>
<formatter name="json-formatter">
<json-formatter/>
</formatter>
<spi name="eventsListener">
<provider name="jboss-logging"
enabled="true">
<properties>
<property name="success-level"
value="info"/>
<property name="error-level"
value="warn"/>
</properties>
</provider>
</spi>
Monitoring
Prometheus JMX exporter
Mtail
mtail
counter keycloak_events by type, realm
/"message":"type=(?P<type>[^,]+),
realmId=(?P<realm>[^,]+),/ {
keycloak_events[$type][$realm]++
}
Going further
Creative Commons Attribution 2.0 https://www.flickr.com/photos/janitors/15795816662/
OSDC 2019 | Single Sign On with Keycloak: why and how by Julien Pivotto
Vault + Keycloak
Issue short lived credentials for many backends
Secured by Keycloak/OpenID Connect
OSDC 2019 | Single Sign On with Keycloak: why and how by Julien Pivotto
Extra notes
Creative Commons Attribution-ShareAlike 2.0 https://www.flickr.com/photos/grungepunk/13994397991
Apps are reponsible
Validate the token
Authorize, based on the claims
Keycloak is business critical
You introduce a unique login point
Think automation, DRP, backups, HA
The "master" realm is all
Secure it
Don't use master password!
Don't reuse it
Open Source clients
Keycloak gatekeeper
mod_auth_openidc
gitlab
vault
open distro for elasticsearch
grafana (oauth)
Public OIDC providers
Belgium: FAS (federal authentication service)
[+ itsme (private)]
France Connect
Open Source alternatives
Gitlab
Dex - https://github.com/dexidp/dex
Conclusion
Single Sign On makes everyones life easier
OpenID Connect is widespread
Keycloak is batteries-included (OIDC/SAML)
Julien Pivotto
roidelapluie
roidelapluie@inuits.eu
Inuits
https://inuits.eu
info@inuits.eu
Contact
1 von 65

Recomendados

Identity management and single sign on - how much flexibility von
Identity management and single sign on - how much flexibilityIdentity management and single sign on - how much flexibility
Identity management and single sign on - how much flexibilityRyan Dawson
855 views44 Folien
Keycloak Single Sign-On von
Keycloak Single Sign-OnKeycloak Single Sign-On
Keycloak Single Sign-OnRavi Yasas
515 views14 Folien
Secure your app with keycloak von
Secure your app with keycloakSecure your app with keycloak
Secure your app with keycloakGuy Marom
865 views48 Folien
Openid & Oauth: An Introduction von
Openid & Oauth: An IntroductionOpenid & Oauth: An Introduction
Openid & Oauth: An IntroductionSteve Ivy
3.1K views22 Folien
Keycloak for Science Gateways - SGCI Technology Sampler Webinar von
Keycloak for Science Gateways - SGCI Technology Sampler WebinarKeycloak for Science Gateways - SGCI Technology Sampler Webinar
Keycloak for Science Gateways - SGCI Technology Sampler Webinarmarcuschristie
356 views28 Folien
Draft: building secure applications with keycloak (oidc/jwt) von
Draft: building secure applications with keycloak (oidc/jwt)Draft: building secure applications with keycloak (oidc/jwt)
Draft: building secure applications with keycloak (oidc/jwt)Abhishek Koserwal
1.3K views8 Folien

Más contenido relacionado

Was ist angesagt?

JWT SSO Inbound Authenticator von
JWT SSO Inbound AuthenticatorJWT SSO Inbound Authenticator
JWT SSO Inbound AuthenticatorMifrazMurthaja
110 views19 Folien
Android app security von
Android app securityAndroid app security
Android app securityPositive Hack Days
448 views44 Folien
OpenId Connect Protocol von
OpenId Connect ProtocolOpenId Connect Protocol
OpenId Connect ProtocolMichael Furman
2.9K views43 Folien
OpenID and OAuth von
OpenID and OAuthOpenID and OAuth
OpenID and OAuthAndrea Chiodoni
4.9K views34 Folien
Adding identity management and access control to your app von
Adding identity management and access control to your appAdding identity management and access control to your app
Adding identity management and access control to your appÁlvaro Alonso González
409 views40 Folien
Web 20 Security - Vordel von
Web 20 Security - VordelWeb 20 Security - Vordel
Web 20 Security - Vordelguest2a1135
557 views34 Folien

Was ist angesagt?(20)

Web 20 Security - Vordel von guest2a1135
Web 20 Security - VordelWeb 20 Security - Vordel
Web 20 Security - Vordel
guest2a1135557 views
Peeples authentication authorization_services_with_saml_xacml_with_jboss_eap6 von Kenneth Peeples
Peeples authentication authorization_services_with_saml_xacml_with_jboss_eap6Peeples authentication authorization_services_with_saml_xacml_with_jboss_eap6
Peeples authentication authorization_services_with_saml_xacml_with_jboss_eap6
Kenneth Peeples3.5K views
Access Management for Cloud and Mobile von ForgeRock
Access Management for Cloud and MobileAccess Management for Cloud and Mobile
Access Management for Cloud and Mobile
ForgeRock2.6K views
Using LDAP directory dor FIDO 2.0 von Tsukasa Hamano
Using LDAP directory dor FIDO 2.0Using LDAP directory dor FIDO 2.0
Using LDAP directory dor FIDO 2.0
Tsukasa Hamano135 views
Introduction to SAML 2.0 von Mika Koivisto
Introduction to SAML 2.0Introduction to SAML 2.0
Introduction to SAML 2.0
Mika Koivisto72.2K views
Saml vs Oauth : Which one should I use? von Anil Saldanha
Saml vs Oauth : Which one should I use?Saml vs Oauth : Which one should I use?
Saml vs Oauth : Which one should I use?
Anil Saldanha22.1K views
Introduction to PicketLink von JBUG London
Introduction to PicketLinkIntroduction to PicketLink
Introduction to PicketLink
JBUG London13.3K views
Java EE Application Security With PicketLink von pigorcraveiro
Java EE Application Security With PicketLinkJava EE Application Security With PicketLink
Java EE Application Security With PicketLink
pigorcraveiro7K views
Web API 2 Token Based Authentication von jeremysbrown
Web API 2 Token Based AuthenticationWeb API 2 Token Based Authentication
Web API 2 Token Based Authentication
jeremysbrown2.6K views
CAS Enhancement von Guo Albert
CAS EnhancementCAS Enhancement
CAS Enhancement
Guo Albert1.6K views
OAuth2 and Spring Security von Orest Ivasiv
OAuth2 and Spring SecurityOAuth2 and Spring Security
OAuth2 and Spring Security
Orest Ivasiv8.5K views
Adding Identity Management and Access Control to your App von FIWARE
Adding Identity Management and Access Control to your AppAdding Identity Management and Access Control to your App
Adding Identity Management and Access Control to your App
FIWARE892 views
SharePoint 2010, Claims-Based Identity, Facebook, and the Cloud von Danny Jessee
SharePoint 2010, Claims-Based Identity, Facebook, and the CloudSharePoint 2010, Claims-Based Identity, Facebook, and the Cloud
SharePoint 2010, Claims-Based Identity, Facebook, and the Cloud
Danny Jessee7.8K views
Securing Applications With Picketlink von Anil Saldanha
Securing Applications With PicketlinkSecuring Applications With Picketlink
Securing Applications With Picketlink
Anil Saldanha8.7K views
OpenID vs OAuth - Identity on the Web von Richard Metzler
OpenID vs OAuth - Identity on the WebOpenID vs OAuth - Identity on the Web
OpenID vs OAuth - Identity on the Web
Richard Metzler13.7K views

Similar a OSDC 2019 | Single Sign On with Keycloak: why and how by Julien Pivotto

Monitoring as an entry point for collaboration von
Monitoring as an entry point for collaborationMonitoring as an entry point for collaboration
Monitoring as an entry point for collaborationJulien Pivotto
1.3K views119 Folien
Authentication and authorization in res tful infrastructures von
Authentication and authorization in res tful infrastructuresAuthentication and authorization in res tful infrastructures
Authentication and authorization in res tful infrastructuresCorley S.r.l.
278 views41 Folien
FIWARE IoT Proposal & Community von
FIWARE IoT Proposal & CommunityFIWARE IoT Proposal & Community
FIWARE IoT Proposal & CommunityFIWARE
2.5K views27 Folien
Introduction To Open Web Protocols von
Introduction To Open Web ProtocolsIntroduction To Open Web Protocols
Introduction To Open Web ProtocolsMohan Krishnan
2.2K views54 Folien
Big problems with big data – Hadoop interfaces security von
Big problems with big data – Hadoop interfaces securityBig problems with big data – Hadoop interfaces security
Big problems with big data – Hadoop interfaces securitySecuRing
6.9K views92 Folien
Kotlin server side frameworks von
Kotlin server side frameworksKotlin server side frameworks
Kotlin server side frameworksKen Yee
966 views32 Folien

Similar a OSDC 2019 | Single Sign On with Keycloak: why and how by Julien Pivotto(20)

Monitoring as an entry point for collaboration von Julien Pivotto
Monitoring as an entry point for collaborationMonitoring as an entry point for collaboration
Monitoring as an entry point for collaboration
Julien Pivotto1.3K views
Authentication and authorization in res tful infrastructures von Corley S.r.l.
Authentication and authorization in res tful infrastructuresAuthentication and authorization in res tful infrastructures
Authentication and authorization in res tful infrastructures
Corley S.r.l.278 views
FIWARE IoT Proposal & Community von FIWARE
FIWARE IoT Proposal & CommunityFIWARE IoT Proposal & Community
FIWARE IoT Proposal & Community
FIWARE2.5K views
Introduction To Open Web Protocols von Mohan Krishnan
Introduction To Open Web ProtocolsIntroduction To Open Web Protocols
Introduction To Open Web Protocols
Mohan Krishnan2.2K views
Big problems with big data – Hadoop interfaces security von SecuRing
Big problems with big data – Hadoop interfaces securityBig problems with big data – Hadoop interfaces security
Big problems with big data – Hadoop interfaces security
SecuRing6.9K views
Kotlin server side frameworks von Ken Yee
Kotlin server side frameworksKotlin server side frameworks
Kotlin server side frameworks
Ken Yee966 views
Fiware IoT_IDAS_intro_ul20_v2 von FIWARE
Fiware IoT_IDAS_intro_ul20_v2Fiware IoT_IDAS_intro_ul20_v2
Fiware IoT_IDAS_intro_ul20_v2
FIWARE8.3K views
Zeronights 2015 - Big problems with big data - Hadoop interfaces security von Jakub Kałużny
Zeronights 2015 - Big problems with big data - Hadoop interfaces securityZeronights 2015 - Big problems with big data - Hadoop interfaces security
Zeronights 2015 - Big problems with big data - Hadoop interfaces security
Jakub Kałużny2.8K views
Introducing PagerDuty Process Automation von Rundeck
Introducing PagerDuty Process AutomationIntroducing PagerDuty Process Automation
Introducing PagerDuty Process Automation
Rundeck364 views
Webinar: ForgeRock Identity Platform Preview (Dec 2015) von ForgeRock
Webinar: ForgeRock Identity Platform Preview (Dec 2015)Webinar: ForgeRock Identity Platform Preview (Dec 2015)
Webinar: ForgeRock Identity Platform Preview (Dec 2015)
ForgeRock4.1K views
Automate That! Scripting Atlassian applications in Python von Atlassian
Automate That! Scripting Atlassian applications in PythonAutomate That! Scripting Atlassian applications in Python
Automate That! Scripting Atlassian applications in Python
Atlassian7K views
Automate that von Atlassian
Automate thatAutomate that
Automate that
Atlassian15.1K views
Is 12 Factor App Right About Logging von Phil Wilkins
Is 12 Factor App Right About LoggingIs 12 Factor App Right About Logging
Is 12 Factor App Right About Logging
Phil Wilkins346 views
Adobe PDF and LiveCycle ES Security von guest2a5a03
Adobe PDF and LiveCycle ES SecurityAdobe PDF and LiveCycle ES Security
Adobe PDF and LiveCycle ES Security
guest2a5a031.6K views
Enabling Web Apps For DoD Security via PKI/CAC Enablement (Forge.Mil case study) von Richard Bullington-McGuire
Enabling Web Apps For DoD Security via PKI/CAC Enablement (Forge.Mil case study)Enabling Web Apps For DoD Security via PKI/CAC Enablement (Forge.Mil case study)
Enabling Web Apps For DoD Security via PKI/CAC Enablement (Forge.Mil case study)
FIWARE Wednesday Webinars - How to Debug IoT Agents von FIWARE
FIWARE Wednesday Webinars - How to Debug IoT AgentsFIWARE Wednesday Webinars - How to Debug IoT Agents
FIWARE Wednesday Webinars - How to Debug IoT Agents
FIWARE819 views
24032022 Zero Trust for Developers Pub.pdf von Tomasz Kopacz
24032022 Zero Trust for Developers Pub.pdf24032022 Zero Trust for Developers Pub.pdf
24032022 Zero Trust for Developers Pub.pdf
Tomasz Kopacz90 views
How to Build a Custom Plugin in Rundeck von Rundeck
How to Build a Custom Plugin in RundeckHow to Build a Custom Plugin in Rundeck
How to Build a Custom Plugin in Rundeck
Rundeck457 views

Último

BushraDBR: An Automatic Approach to Retrieving Duplicate Bug Reports von
BushraDBR: An Automatic Approach to Retrieving Duplicate Bug ReportsBushraDBR: An Automatic Approach to Retrieving Duplicate Bug Reports
BushraDBR: An Automatic Approach to Retrieving Duplicate Bug ReportsRa'Fat Al-Msie'deen
5 views49 Folien
Elevate your SAP landscape's efficiency and performance with HCL Workload Aut... von
Elevate your SAP landscape's efficiency and performance with HCL Workload Aut...Elevate your SAP landscape's efficiency and performance with HCL Workload Aut...
Elevate your SAP landscape's efficiency and performance with HCL Workload Aut...HCLSoftware
6 views2 Folien
SUGCON ANZ Presentation V2.1 Final.pptx von
SUGCON ANZ Presentation V2.1 Final.pptxSUGCON ANZ Presentation V2.1 Final.pptx
SUGCON ANZ Presentation V2.1 Final.pptxJack Spektor
22 views34 Folien
DSD-INT 2023 Next-Generation Flood Inundation Mapping for Taiwan - Delft3D FM... von
DSD-INT 2023 Next-Generation Flood Inundation Mapping for Taiwan - Delft3D FM...DSD-INT 2023 Next-Generation Flood Inundation Mapping for Taiwan - Delft3D FM...
DSD-INT 2023 Next-Generation Flood Inundation Mapping for Taiwan - Delft3D FM...Deltares
7 views40 Folien
Upgrading Incident Management with Icinga - Icinga Camp Milan 2023 von
Upgrading Incident Management with Icinga - Icinga Camp Milan 2023Upgrading Incident Management with Icinga - Icinga Camp Milan 2023
Upgrading Incident Management with Icinga - Icinga Camp Milan 2023Icinga
38 views17 Folien
Neo4j y GenAI von
Neo4j y GenAI Neo4j y GenAI
Neo4j y GenAI Neo4j
42 views41 Folien

Último(20)

BushraDBR: An Automatic Approach to Retrieving Duplicate Bug Reports von Ra'Fat Al-Msie'deen
BushraDBR: An Automatic Approach to Retrieving Duplicate Bug ReportsBushraDBR: An Automatic Approach to Retrieving Duplicate Bug Reports
BushraDBR: An Automatic Approach to Retrieving Duplicate Bug Reports
Elevate your SAP landscape's efficiency and performance with HCL Workload Aut... von HCLSoftware
Elevate your SAP landscape's efficiency and performance with HCL Workload Aut...Elevate your SAP landscape's efficiency and performance with HCL Workload Aut...
Elevate your SAP landscape's efficiency and performance with HCL Workload Aut...
HCLSoftware6 views
SUGCON ANZ Presentation V2.1 Final.pptx von Jack Spektor
SUGCON ANZ Presentation V2.1 Final.pptxSUGCON ANZ Presentation V2.1 Final.pptx
SUGCON ANZ Presentation V2.1 Final.pptx
Jack Spektor22 views
DSD-INT 2023 Next-Generation Flood Inundation Mapping for Taiwan - Delft3D FM... von Deltares
DSD-INT 2023 Next-Generation Flood Inundation Mapping for Taiwan - Delft3D FM...DSD-INT 2023 Next-Generation Flood Inundation Mapping for Taiwan - Delft3D FM...
DSD-INT 2023 Next-Generation Flood Inundation Mapping for Taiwan - Delft3D FM...
Deltares7 views
Upgrading Incident Management with Icinga - Icinga Camp Milan 2023 von Icinga
Upgrading Incident Management with Icinga - Icinga Camp Milan 2023Upgrading Incident Management with Icinga - Icinga Camp Milan 2023
Upgrading Incident Management with Icinga - Icinga Camp Milan 2023
Icinga38 views
Neo4j y GenAI von Neo4j
Neo4j y GenAI Neo4j y GenAI
Neo4j y GenAI
Neo4j42 views
DSD-INT 2023 Delft3D FM Suite 2024.01 1D2D - Beta testing programme - Geertsema von Deltares
DSD-INT 2023 Delft3D FM Suite 2024.01 1D2D - Beta testing programme - GeertsemaDSD-INT 2023 Delft3D FM Suite 2024.01 1D2D - Beta testing programme - Geertsema
DSD-INT 2023 Delft3D FM Suite 2024.01 1D2D - Beta testing programme - Geertsema
Deltares17 views
Roadmap y Novedades de producto von Neo4j
Roadmap y Novedades de productoRoadmap y Novedades de producto
Roadmap y Novedades de producto
Neo4j50 views
DSD-INT 2023 Wave-Current Interaction at Montrose Tidal Inlet System and Its ... von Deltares
DSD-INT 2023 Wave-Current Interaction at Montrose Tidal Inlet System and Its ...DSD-INT 2023 Wave-Current Interaction at Montrose Tidal Inlet System and Its ...
DSD-INT 2023 Wave-Current Interaction at Montrose Tidal Inlet System and Its ...
Deltares9 views
DSD-INT 2023 Simulating a falling apron in Delft3D 4 - Engineering Practice -... von Deltares
DSD-INT 2023 Simulating a falling apron in Delft3D 4 - Engineering Practice -...DSD-INT 2023 Simulating a falling apron in Delft3D 4 - Engineering Practice -...
DSD-INT 2023 Simulating a falling apron in Delft3D 4 - Engineering Practice -...
Deltares6 views
DSD-INT 2023 Delft3D FM Suite 2024.01 2D3D - New features + Improvements - Ge... von Deltares
DSD-INT 2023 Delft3D FM Suite 2024.01 2D3D - New features + Improvements - Ge...DSD-INT 2023 Delft3D FM Suite 2024.01 2D3D - New features + Improvements - Ge...
DSD-INT 2023 Delft3D FM Suite 2024.01 2D3D - New features + Improvements - Ge...
Deltares16 views
Geospatial Synergy: Amplifying Efficiency with FME & Esri ft. Peak Guest Spea... von Safe Software
Geospatial Synergy: Amplifying Efficiency with FME & Esri ft. Peak Guest Spea...Geospatial Synergy: Amplifying Efficiency with FME & Esri ft. Peak Guest Spea...
Geospatial Synergy: Amplifying Efficiency with FME & Esri ft. Peak Guest Spea...
Safe Software412 views
Fleet Management Software in India von Fleetable
Fleet Management Software in India Fleet Management Software in India
Fleet Management Software in India
Fleetable11 views
DSD-INT 2023 3D hydrodynamic modelling of microplastic transport in lakes - J... von Deltares
DSD-INT 2023 3D hydrodynamic modelling of microplastic transport in lakes - J...DSD-INT 2023 3D hydrodynamic modelling of microplastic transport in lakes - J...
DSD-INT 2023 3D hydrodynamic modelling of microplastic transport in lakes - J...
Deltares9 views
Software evolution understanding: Automatic extraction of software identifier... von Ra'Fat Al-Msie'deen
Software evolution understanding: Automatic extraction of software identifier...Software evolution understanding: Automatic extraction of software identifier...
Software evolution understanding: Automatic extraction of software identifier...
El Arte de lo Possible von Neo4j
El Arte de lo PossibleEl Arte de lo Possible
El Arte de lo Possible
Neo4j38 views
What Can Employee Monitoring Software Do?​ von wAnywhere
What Can Employee Monitoring Software Do?​What Can Employee Monitoring Software Do?​
What Can Employee Monitoring Software Do?​
wAnywhere21 views
Consulting for Data Monetization Maximizing the Profit Potential of Your Data... von Flexsin
Consulting for Data Monetization Maximizing the Profit Potential of Your Data...Consulting for Data Monetization Maximizing the Profit Potential of Your Data...
Consulting for Data Monetization Maximizing the Profit Potential of Your Data...
Flexsin 15 views

OSDC 2019 | Single Sign On with Keycloak: why and how by Julien Pivotto