SlideShare ist ein Scribd-Unternehmen logo
1 von 3
Downloaden Sie, um offline zu lesen
Training KeyCloak - Redhat SSO UMA
May 2019
RH-SSO/Keycloak UMA training – Janua - Copyright 2004-2019 Page 1/3
Table des matières
1 History.............................................................................................................................................5
2 Using UMA and Keycloak..............................................................................................................6
2.1 Presentation – What is UMA ?.................................................................................................6
2.2 Pointers....................................................................................................................................6
2.3 UMA Key stakeholders............................................................................................................6
2.4 UMA workflow........................................................................................................................6
2.5 UMA typical use case..............................................................................................................8
2.6 Illustration of a RPT token (Request Party Token)..................................................................9
2.7 Illustration of a resource (Keycloak).....................................................................................10
2.8 Using permission...................................................................................................................11
2.9 Request approval or revokation.............................................................................................12
2.10 UMA with Keycloak – Improve application productivity...................................................12
3 UMA photoz keycloak example....................................................................................................13
3.1 Presentation............................................................................................................................13
3.2 Deploying uma photoz example............................................................................................13
3.2.1 Starting keycloak............................................................................................................13
3.2.2 Starting wildfly.............................................................................................................13
3.2.3 Deploy app-authz-uma-photoz example........................................................................13
3.2.4 Uploading uma-photoz config file.................................................................................14
3.3 Presentation of uma_photoz application................................................................................14
3.3.1 Uma_photoz architecture...............................................................................................15
3.3.2 Uma_photoz actions.......................................................................................................15
3.3.3 Uma_photoz policy........................................................................................................15
3.4 Photoz-restful-api application................................................................................................16
3.4.1 Photoz-restful-api settings..............................................................................................16
3.4.2 Photoz-restful-api Resources.........................................................................................17
3.4.3 Authorization scopes......................................................................................................19
3.4.4 Policies...........................................................................................................................19
3.4.5 Permission......................................................................................................................21
Scope base permission..............................................................................................................22
3.5 UMA-Photoz Lifecycle..........................................................................................................22
3.5.1 after login.......................................................................................................................22
3.5.2 listing resource created...................................................................................................23
3.5.3 Sharing Resource...........................................................................................................23
3.5.4 Listing Resources of Alice.............................................................................................24
3.5.5 Logging as Jdoe.............................................................................................................24
3.6 Request Approbation Lifecycle.............................................................................................25
3.6.1 Pending approval request...............................................................................................25
3.6.2 Request revokation.........................................................................................................25
4 Accessing UMA through REST API.............................................................................................26
4.1 Presentation............................................................................................................................26
4.2 Scenarios................................................................................................................................26
4.3 scripts used.............................................................................................................................27
4.3.1 access_token...................................................................................................................27
4.3.2 UMA ticket request........................................................................................................27
4.3.3 RPT token request (no persistence permission).............................................................27
4.3.4 RPT token request (persisting permission)....................................................................27
4.3.5 UMA access using RPT.................................................................................................27
4.4 Scenario1...............................................................................................................................28
RH-SSO/Keycloak UMA training – Janua - Copyright 2004-2019 Page 2/3
4.4.1 Reminder of (1) alice has created an album alice3........................................................28
4.4.2 (6) Jdoe can access to the resourcethe scenario1...........................................................28
4.4.3 Step 1 – creation of Album alice1..................................................................................28
4.4.4 Step2 creation of an RPT for Alice................................................................................28
4.5 Scenario2...............................................................................................................................33
4.5.1 Reminder........................................................................................................................33
4.6 Listing all the resources.........................................................................................................39
4.6.1 Resource_set endpoint...................................................................................................39
4.6.2 PAT token (Protected access token)...............................................................................39
4.6.3 Listing all the resources.................................................................................................39
4.6.4 Listing/zooming a particular resource............................................................................40
4.6.5 Creation of a new resources...........................................................................................41
4.7 Using permissions..................................................................................................................41
4.7.1 step 1 - Jdoe trying to access A4 (403 - access unauthorized).......................................41
4.7.2 A4 - Jdoe pending approval (alice action)......................................................................42
4.7.3 Approving a pending request using REST API..............................................................42
4.7.4 Revoking access to a resource........................................................................................43
4.7.5 Listing all permissions...................................................................................................44
4.8 Pointers..................................................................................................................................45
RH-SSO/Keycloak UMA training – Janua - Copyright 2004-2019 Page 3/3

Weitere ähnliche Inhalte

Was ist angesagt?

AUTOMATISATION DU DEPLOIEMENT ET DE LA GESTION DES RESEAUX VIRTUELS DANS LE C...
AUTOMATISATION DU DEPLOIEMENT ET DE LA GESTION DES RESEAUX VIRTUELS DANS LE C...AUTOMATISATION DU DEPLOIEMENT ET DE LA GESTION DES RESEAUX VIRTUELS DANS LE C...
AUTOMATISATION DU DEPLOIEMENT ET DE LA GESTION DES RESEAUX VIRTUELS DANS LE C...
Khadidja BOUKREDIMI
 
Weg rele-programavel-clic-02-3rd-manual-portugues-br
Weg rele-programavel-clic-02-3rd-manual-portugues-brWeg rele-programavel-clic-02-3rd-manual-portugues-br
Weg rele-programavel-clic-02-3rd-manual-portugues-br
Daniel Dourado
 
Mise en place d’une infrastructure cloud basée sur cloudstack
Mise en place d’une infrastructure cloud basée sur cloudstackMise en place d’une infrastructure cloud basée sur cloudstack
Mise en place d’une infrastructure cloud basée sur cloudstack
chammem
 
Manual de serviço electrolux top 8
Manual de serviço   electrolux top 8Manual de serviço   electrolux top 8
Manual de serviço electrolux top 8
Maurilio Caetano
 

Was ist angesagt? (20)

Rapprot de satge supervision de résau par EyesOfNetwok
Rapprot de satge supervision de résau par EyesOfNetwokRapprot de satge supervision de résau par EyesOfNetwok
Rapprot de satge supervision de résau par EyesOfNetwok
 
AUTOMATISATION DU DEPLOIEMENT ET DE LA GESTION DES RESEAUX VIRTUELS DANS LE C...
AUTOMATISATION DU DEPLOIEMENT ET DE LA GESTION DES RESEAUX VIRTUELS DANS LE C...AUTOMATISATION DU DEPLOIEMENT ET DE LA GESTION DES RESEAUX VIRTUELS DANS LE C...
AUTOMATISATION DU DEPLOIEMENT ET DE LA GESTION DES RESEAUX VIRTUELS DANS LE C...
 
Présentation Master
Présentation Master Présentation Master
Présentation Master
 
Weg rele-programavel-clic-02-3rd-manual-portugues-br
Weg rele-programavel-clic-02-3rd-manual-portugues-brWeg rele-programavel-clic-02-3rd-manual-portugues-br
Weg rele-programavel-clic-02-3rd-manual-portugues-br
 
Rapport de pfe gestion de parc informatique et Helpdesk
Rapport de pfe gestion de parc informatique et HelpdeskRapport de pfe gestion de parc informatique et Helpdesk
Rapport de pfe gestion de parc informatique et Helpdesk
 
Mise en place d’une infrastructure cloud basée sur cloudstack
Mise en place d’une infrastructure cloud basée sur cloudstackMise en place d’une infrastructure cloud basée sur cloudstack
Mise en place d’une infrastructure cloud basée sur cloudstack
 
Liaison CM2-6e Découverte du CDI - Parcours 2
Liaison CM2-6e Découverte du CDI - Parcours  2Liaison CM2-6e Découverte du CDI - Parcours  2
Liaison CM2-6e Découverte du CDI - Parcours 2
 
Conception et réalisation d’une application web d’enregistrement des actes, ...
Conception et réalisation d’une application web d’enregistrement des  actes, ...Conception et réalisation d’une application web d’enregistrement des  actes, ...
Conception et réalisation d’une application web d’enregistrement des actes, ...
 
Rapport de stage Application web Gestion RH ASP.NET MVC5
Rapport de stage Application web Gestion RH ASP.NET MVC5Rapport de stage Application web Gestion RH ASP.NET MVC5
Rapport de stage Application web Gestion RH ASP.NET MVC5
 
Web Dynpro
Web DynproWeb Dynpro
Web Dynpro
 
本当にできるの?ミッションクリティカルシステムのクラウド移行ダイジェスト (Oracle Cloudウェビナーシリーズ: 2021年7月7日)
本当にできるの?ミッションクリティカルシステムのクラウド移行ダイジェスト (Oracle Cloudウェビナーシリーズ: 2021年7月7日)本当にできるの?ミッションクリティカルシステムのクラウド移行ダイジェスト (Oracle Cloudウェビナーシリーズ: 2021年7月7日)
本当にできるの?ミッションクリティカルシステムのクラウド移行ダイジェスト (Oracle Cloudウェビナーシリーズ: 2021年7月7日)
 
Manual de serviço electrolux top 8
Manual de serviço   electrolux top 8Manual de serviço   electrolux top 8
Manual de serviço electrolux top 8
 
Rapport de PFE
Rapport de PFERapport de PFE
Rapport de PFE
 
はじめてのAzure Web App for Containers! -コンテナの基礎から DevOps 環境の構築まで-
はじめてのAzure Web App for Containers! -コンテナの基礎から DevOps 環境の構築まで-はじめてのAzure Web App for Containers! -コンテナの基礎から DevOps 環境の構築まで-
はじめてのAzure Web App for Containers! -コンテナの基礎から DevOps 環境の構築まで-
 
Baremetal openstackのご紹介
Baremetal openstackのご紹介Baremetal openstackのご紹介
Baremetal openstackのご紹介
 
Processo de distribuição (Outbound)
Processo de distribuição (Outbound)Processo de distribuição (Outbound)
Processo de distribuição (Outbound)
 
MONITORING APPLICATIF
MONITORING APPLICATIFMONITORING APPLICATIF
MONITORING APPLICATIF
 
SAP Portal kılavuzu
SAP Portal kılavuzuSAP Portal kılavuzu
SAP Portal kılavuzu
 
Mise en place de deux réseaux LAN interconnectés par un réseau WAN
Mise en place de deux réseaux LAN interconnectés par un réseau WANMise en place de deux réseaux LAN interconnectés par un réseau WAN
Mise en place de deux réseaux LAN interconnectés par un réseau WAN
 
とっておきの方法! Oracle Databaseの自動アップグレードのお勧め手法 省力・最新化 概要編 (Oracle Cloudウェビナーシリーズ: ...
とっておきの方法! Oracle Databaseの自動アップグレードのお勧め手法 省力・最新化 概要編 (Oracle Cloudウェビナーシリーズ: ...とっておきの方法! Oracle Databaseの自動アップグレードのお勧め手法 省力・最新化 概要編 (Oracle Cloudウェビナーシリーズ: ...
とっておきの方法! Oracle Databaseの自動アップグレードのお勧め手法 省力・最新化 概要編 (Oracle Cloudウェビナーシリーズ: ...
 

Ähnlich wie TOC training Keycloak RedhatSSO UMA

App designprocess(yukijiang)
App designprocess(yukijiang)App designprocess(yukijiang)
App designprocess(yukijiang)
Xue Jiang
 
Ppdg Robust File Replication
Ppdg Robust File ReplicationPpdg Robust File Replication
Ppdg Robust File Replication
guest0dc8a2
 
Report-Bilong&Jing-final
Report-Bilong&Jing-finalReport-Bilong&Jing-final
Report-Bilong&Jing-final
Jing KE
 
Protective Device Coordination
Protective Device CoordinationProtective Device Coordination
Protective Device Coordination
joeengi
 
Spring Reference
Spring ReferenceSpring Reference
Spring Reference
asas
 
cloudscaleenvironment-userguide_1_1 (1)
cloudscaleenvironment-userguide_1_1 (1)cloudscaleenvironment-userguide_1_1 (1)
cloudscaleenvironment-userguide_1_1 (1)
Jure Polutnik
 

Ähnlich wie TOC training Keycloak RedhatSSO UMA (20)

App designprocess(yukijiang)
App designprocess(yukijiang)App designprocess(yukijiang)
App designprocess(yukijiang)
 
Ppdg Robust File Replication
Ppdg Robust File ReplicationPpdg Robust File Replication
Ppdg Robust File Replication
 
Course lab 2_guide_eng
Course lab 2_guide_engCourse lab 2_guide_eng
Course lab 2_guide_eng
 
Course lab 2_guide_eng
Course lab 2_guide_engCourse lab 2_guide_eng
Course lab 2_guide_eng
 
Icp
IcpIcp
Icp
 
Gate coaching in chandigarh
Gate coaching in chandigarhGate coaching in chandigarh
Gate coaching in chandigarh
 
Tellurium 0.6.0 User Guide
Tellurium 0.6.0 User GuideTellurium 0.6.0 User Guide
Tellurium 0.6.0 User Guide
 
Foundry technology note
Foundry technology noteFoundry technology note
Foundry technology note
 
Report-Bilong&Jing-final
Report-Bilong&Jing-finalReport-Bilong&Jing-final
Report-Bilong&Jing-final
 
Gate brouchre
Gate brouchreGate brouchre
Gate brouchre
 
NX9 for Engineering Design
NX9 for Engineering DesignNX9 for Engineering Design
NX9 for Engineering Design
 
Protective Device Coordination
Protective Device CoordinationProtective Device Coordination
Protective Device Coordination
 
Virtual Classroom System for Women`s University in Africa
Virtual Classroom System for Women`s University in AfricaVirtual Classroom System for Women`s University in Africa
Virtual Classroom System for Women`s University in Africa
 
TOC training Keycloak RedhatSSO advanced
TOC training Keycloak RedhatSSO advancedTOC training Keycloak RedhatSSO advanced
TOC training Keycloak RedhatSSO advanced
 
perl_tk_tutorial
perl_tk_tutorialperl_tk_tutorial
perl_tk_tutorial
 
perl_tk_tutorial
perl_tk_tutorialperl_tk_tutorial
perl_tk_tutorial
 
Spring Reference
Spring ReferenceSpring Reference
Spring Reference
 
Manual tutorial-spring-java
Manual tutorial-spring-javaManual tutorial-spring-java
Manual tutorial-spring-java
 
BizTalk Practical Course Preview
BizTalk Practical Course PreviewBizTalk Practical Course Preview
BizTalk Practical Course Preview
 
cloudscaleenvironment-userguide_1_1 (1)
cloudscaleenvironment-userguide_1_1 (1)cloudscaleenvironment-userguide_1_1 (1)
cloudscaleenvironment-userguide_1_1 (1)
 

Mehr von Pascal Flamand

Mehr von Pascal Flamand (20)

Start14 french tech startuffe nation
Start14 french tech startuffe nationStart14 french tech startuffe nation
Start14 french tech startuffe nation
 
Article "Un an de télétravail et de COVID" dans le magazine Start
Article "Un an de télétravail et de COVID" dans le magazine StartArticle "Un an de télétravail et de COVID" dans le magazine Start
Article "Un an de télétravail et de COVID" dans le magazine Start
 
Article "La tyrannie du risque zéro" dans le magazine Start
Article "La tyrannie du risque zéro" dans le magazine StartArticle "La tyrannie du risque zéro" dans le magazine Start
Article "La tyrannie du risque zéro" dans le magazine Start
 
Article "quand les licornes voleront..." dans le magazine Start
Article "quand les licornes voleront..." dans le magazine StartArticle "quand les licornes voleront..." dans le magazine Start
Article "quand les licornes voleront..." dans le magazine Start
 
Article sur "Le temps des c(e)rises" dans le magazine Start
Article sur "Le temps des c(e)rises" dans le magazine StartArticle sur "Le temps des c(e)rises" dans le magazine Start
Article sur "Le temps des c(e)rises" dans le magazine Start
 
Article sur l'Agilité dans le magazine Start
Article sur l'Agilité dans le magazine StartArticle sur l'Agilité dans le magazine Start
Article sur l'Agilité dans le magazine Start
 
Article sur l'IA dans le magazine Start
Article sur l'IA dans le magazine StartArticle sur l'IA dans le magazine Start
Article sur l'IA dans le magazine Start
 
Article sur la Smart City dans le magazine Start
Article sur la Smart City dans le magazine StartArticle sur la Smart City dans le magazine Start
Article sur la Smart City dans le magazine Start
 
Article sur les Startup dans le magazine Start
Article sur les Startup dans le magazine StartArticle sur les Startup dans le magazine Start
Article sur les Startup dans le magazine Start
 
TOC training KeyCloak Redhat SSO core
TOC training KeyCloak Redhat SSO coreTOC training KeyCloak Redhat SSO core
TOC training KeyCloak Redhat SSO core
 
TOC training OpenIDM
TOC training OpenIDMTOC training OpenIDM
TOC training OpenIDM
 
Article sur les Pitchs dans le magazine Start
Article sur les Pitchs dans le magazine StartArticle sur les Pitchs dans le magazine Start
Article sur les Pitchs dans le magazine Start
 
Article sur la Transformation Digitale dans le Magazine Start
Article sur la Transformation Digitale dans le Magazine StartArticle sur la Transformation Digitale dans le Magazine Start
Article sur la Transformation Digitale dans le Magazine Start
 
Article sur l'IA dans le magazine Start
Article sur l'IA dans le magazine StartArticle sur l'IA dans le magazine Start
Article sur l'IA dans le magazine Start
 
Tribune paca jaguards 12.12.18
Tribune paca jaguards 12.12.18Tribune paca jaguards 12.12.18
Tribune paca jaguards 12.12.18
 
Partenariat Jaguards - Busit
Partenariat Jaguards - BusitPartenariat Jaguards - Busit
Partenariat Jaguards - Busit
 
La tribune ce que booster apporte à semantic experts
La tribune   ce que booster apporte à semantic expertsLa tribune   ce que booster apporte à semantic experts
La tribune ce que booster apporte à semantic experts
 
OPENAM 13.5 - Core Token Service
OPENAM 13.5 - Core Token ServiceOPENAM 13.5 - Core Token Service
OPENAM 13.5 - Core Token Service
 
La tribune Jaguards juillet 2017
La tribune Jaguards juillet 2017La tribune Jaguards juillet 2017
La tribune Jaguards juillet 2017
 
Rapport d'activité Telecom Valley 2016
Rapport d'activité Telecom Valley 2016Rapport d'activité Telecom Valley 2016
Rapport d'activité Telecom Valley 2016
 

Kürzlich hochgeladen

( Pune ) VIP Pimpri Chinchwad Call Girls 🎗️ 9352988975 Sizzling | Escorts | G...
( Pune ) VIP Pimpri Chinchwad Call Girls 🎗️ 9352988975 Sizzling | Escorts | G...( Pune ) VIP Pimpri Chinchwad Call Girls 🎗️ 9352988975 Sizzling | Escorts | G...
( Pune ) VIP Pimpri Chinchwad Call Girls 🎗️ 9352988975 Sizzling | Escorts | G...
nilamkumrai
 
➥🔝 7737669865 🔝▻ mehsana Call-girls in Women Seeking Men 🔝mehsana🔝 Escorts...
➥🔝 7737669865 🔝▻ mehsana Call-girls in Women Seeking Men  🔝mehsana🔝   Escorts...➥🔝 7737669865 🔝▻ mehsana Call-girls in Women Seeking Men  🔝mehsana🔝   Escorts...
➥🔝 7737669865 🔝▻ mehsana Call-girls in Women Seeking Men 🔝mehsana🔝 Escorts...
nirzagarg
 
📱Dehradun Call Girls Service 📱☎️ +91'905,3900,678 ☎️📱 Call Girls In Dehradun 📱
📱Dehradun Call Girls Service 📱☎️ +91'905,3900,678 ☎️📱 Call Girls In Dehradun 📱📱Dehradun Call Girls Service 📱☎️ +91'905,3900,678 ☎️📱 Call Girls In Dehradun 📱
📱Dehradun Call Girls Service 📱☎️ +91'905,3900,678 ☎️📱 Call Girls In Dehradun 📱
@Chandigarh #call #Girls 9053900678 @Call #Girls in @Punjab 9053900678
 
Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵
Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵
Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵
Chandigarh Call girls 9053900678 Call girls in Chandigarh
 

Kürzlich hochgeladen (20)

Trump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts SweatshirtTrump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts Sweatshirt
 
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting High Prof...
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting  High Prof...VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting  High Prof...
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting High Prof...
 
Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...
Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...
Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...
 
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
 
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort ServiceBusty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
 
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...
 
( Pune ) VIP Pimpri Chinchwad Call Girls 🎗️ 9352988975 Sizzling | Escorts | G...
( Pune ) VIP Pimpri Chinchwad Call Girls 🎗️ 9352988975 Sizzling | Escorts | G...( Pune ) VIP Pimpri Chinchwad Call Girls 🎗️ 9352988975 Sizzling | Escorts | G...
( Pune ) VIP Pimpri Chinchwad Call Girls 🎗️ 9352988975 Sizzling | Escorts | G...
 
➥🔝 7737669865 🔝▻ mehsana Call-girls in Women Seeking Men 🔝mehsana🔝 Escorts...
➥🔝 7737669865 🔝▻ mehsana Call-girls in Women Seeking Men  🔝mehsana🔝   Escorts...➥🔝 7737669865 🔝▻ mehsana Call-girls in Women Seeking Men  🔝mehsana🔝   Escorts...
➥🔝 7737669865 🔝▻ mehsana Call-girls in Women Seeking Men 🔝mehsana🔝 Escorts...
 
Top Rated Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
Top Rated  Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...Top Rated  Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
Top Rated Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
 
Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...
Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...
Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...
 
20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf
 
Yerawada ] Independent Escorts in Pune - Book 8005736733 Call Girls Available...
Yerawada ] Independent Escorts in Pune - Book 8005736733 Call Girls Available...Yerawada ] Independent Escorts in Pune - Book 8005736733 Call Girls Available...
Yerawada ] Independent Escorts in Pune - Book 8005736733 Call Girls Available...
 
📱Dehradun Call Girls Service 📱☎️ +91'905,3900,678 ☎️📱 Call Girls In Dehradun 📱
📱Dehradun Call Girls Service 📱☎️ +91'905,3900,678 ☎️📱 Call Girls In Dehradun 📱📱Dehradun Call Girls Service 📱☎️ +91'905,3900,678 ☎️📱 Call Girls In Dehradun 📱
📱Dehradun Call Girls Service 📱☎️ +91'905,3900,678 ☎️📱 Call Girls In Dehradun 📱
 
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
 
Nanded City ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready ...
Nanded City ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready ...Nanded City ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready ...
Nanded City ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready ...
 
Pirangut | Call Girls Pune Phone No 8005736733 Elite Escort Service Available...
Pirangut | Call Girls Pune Phone No 8005736733 Elite Escort Service Available...Pirangut | Call Girls Pune Phone No 8005736733 Elite Escort Service Available...
Pirangut | Call Girls Pune Phone No 8005736733 Elite Escort Service Available...
 
Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵
Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵
Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵
 
"Boost Your Digital Presence: Partner with a Leading SEO Agency"
"Boost Your Digital Presence: Partner with a Leading SEO Agency""Boost Your Digital Presence: Partner with a Leading SEO Agency"
"Boost Your Digital Presence: Partner with a Leading SEO Agency"
 
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
 
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
 

TOC training Keycloak RedhatSSO UMA

  • 1. Training KeyCloak - Redhat SSO UMA May 2019 RH-SSO/Keycloak UMA training – Janua - Copyright 2004-2019 Page 1/3
  • 2. Table des matières 1 History.............................................................................................................................................5 2 Using UMA and Keycloak..............................................................................................................6 2.1 Presentation – What is UMA ?.................................................................................................6 2.2 Pointers....................................................................................................................................6 2.3 UMA Key stakeholders............................................................................................................6 2.4 UMA workflow........................................................................................................................6 2.5 UMA typical use case..............................................................................................................8 2.6 Illustration of a RPT token (Request Party Token)..................................................................9 2.7 Illustration of a resource (Keycloak).....................................................................................10 2.8 Using permission...................................................................................................................11 2.9 Request approval or revokation.............................................................................................12 2.10 UMA with Keycloak – Improve application productivity...................................................12 3 UMA photoz keycloak example....................................................................................................13 3.1 Presentation............................................................................................................................13 3.2 Deploying uma photoz example............................................................................................13 3.2.1 Starting keycloak............................................................................................................13 3.2.2 Starting wildfly.............................................................................................................13 3.2.3 Deploy app-authz-uma-photoz example........................................................................13 3.2.4 Uploading uma-photoz config file.................................................................................14 3.3 Presentation of uma_photoz application................................................................................14 3.3.1 Uma_photoz architecture...............................................................................................15 3.3.2 Uma_photoz actions.......................................................................................................15 3.3.3 Uma_photoz policy........................................................................................................15 3.4 Photoz-restful-api application................................................................................................16 3.4.1 Photoz-restful-api settings..............................................................................................16 3.4.2 Photoz-restful-api Resources.........................................................................................17 3.4.3 Authorization scopes......................................................................................................19 3.4.4 Policies...........................................................................................................................19 3.4.5 Permission......................................................................................................................21 Scope base permission..............................................................................................................22 3.5 UMA-Photoz Lifecycle..........................................................................................................22 3.5.1 after login.......................................................................................................................22 3.5.2 listing resource created...................................................................................................23 3.5.3 Sharing Resource...........................................................................................................23 3.5.4 Listing Resources of Alice.............................................................................................24 3.5.5 Logging as Jdoe.............................................................................................................24 3.6 Request Approbation Lifecycle.............................................................................................25 3.6.1 Pending approval request...............................................................................................25 3.6.2 Request revokation.........................................................................................................25 4 Accessing UMA through REST API.............................................................................................26 4.1 Presentation............................................................................................................................26 4.2 Scenarios................................................................................................................................26 4.3 scripts used.............................................................................................................................27 4.3.1 access_token...................................................................................................................27 4.3.2 UMA ticket request........................................................................................................27 4.3.3 RPT token request (no persistence permission).............................................................27 4.3.4 RPT token request (persisting permission)....................................................................27 4.3.5 UMA access using RPT.................................................................................................27 4.4 Scenario1...............................................................................................................................28 RH-SSO/Keycloak UMA training – Janua - Copyright 2004-2019 Page 2/3
  • 3. 4.4.1 Reminder of (1) alice has created an album alice3........................................................28 4.4.2 (6) Jdoe can access to the resourcethe scenario1...........................................................28 4.4.3 Step 1 – creation of Album alice1..................................................................................28 4.4.4 Step2 creation of an RPT for Alice................................................................................28 4.5 Scenario2...............................................................................................................................33 4.5.1 Reminder........................................................................................................................33 4.6 Listing all the resources.........................................................................................................39 4.6.1 Resource_set endpoint...................................................................................................39 4.6.2 PAT token (Protected access token)...............................................................................39 4.6.3 Listing all the resources.................................................................................................39 4.6.4 Listing/zooming a particular resource............................................................................40 4.6.5 Creation of a new resources...........................................................................................41 4.7 Using permissions..................................................................................................................41 4.7.1 step 1 - Jdoe trying to access A4 (403 - access unauthorized).......................................41 4.7.2 A4 - Jdoe pending approval (alice action)......................................................................42 4.7.3 Approving a pending request using REST API..............................................................42 4.7.4 Revoking access to a resource........................................................................................43 4.7.5 Listing all permissions...................................................................................................44 4.8 Pointers..................................................................................................................................45 RH-SSO/Keycloak UMA training – Janua - Copyright 2004-2019 Page 3/3