Delegating the chores of authenticating users to Keycloak
Stop building user authentication. Learn how to delegate the chores of registration, password resets, and session management to Keycloak and focus on your core application.
#1about 3 minutes
Understanding the complexities of modern user authentication
Delegating authentication is necessary because it involves more than just a login form, including registration, password recovery, and multi-factor authentication.
#2about 2 minutes
Introducing the key players in an OIDC ecosystem
The OpenID Connect architecture consists of three main actors: the end-user, the OpenID Provider like Keycloak, and the client application or relying party.
#3about 6 minutes
Using OIDC prompts for different user actions
Applications can use specific OIDC prompt parameters to check login status, initiate user registration, or trigger a standard login.
#4about 3 minutes
Handling session state, tokens, and user information
OpenID Connect provides standard endpoints and flows for checking session status with iframes, refreshing expired tokens, fetching user data, and securely logging out.
#5about 1 minute
Implementing step-up authentication for sensitive actions
Use Authentication Context Class Reference (ACR) values to request a higher level of assurance, such as a second factor, for critical operations.
Keycloak's application-initiated actions allow you to redirect users to specific pages for tasks like updating their profile, changing a password, or verifying an email address.
#7about 2 minutes
Configuring user profiles for incremental data collection
Keycloak's user profile feature enables defining custom user attributes and using scopes to implement incremental profiling, collecting data only when an application requires it.
#8about 3 minutes
Customizing login flows and exploring further capabilities
Beyond standard authentication, Keycloak allows for customizing login flows to restrict client access and provides built-in support for features like password resets and remember me.
Related jobs
Jobs that call for the skills explored in this talk.
Matching moments
02:43 MIN
An overview of Keycloak for identity management
Keycloak case study: Making users happy with service level indicators and observability
18:31 MIN
Implementing authentication with Keycloak, Quarkus, and JWT
Get started with securing your cloud-native Java microservices applications
01:08 MIN
Introducing Keymate for zero-rewrite authorization on Keycloak
Keymate – Modern Authorization for Developers
18:44 MIN
Answering audience questions on authorization best practices
Un-complicate authorization maintenance
11:03 MIN
Q&A on career path and the future of passwordless
Accelerating Authentication Architecture: Taking Passwordless to the Next Level
05:40 MIN
Unifying tools with a centralized authentication system
Starting business without breaking the bank: Self hosted OSS productivity ecosystem
05:36 MIN
Deploying and configuring Keycloak for identity management
Get started with securing your cloud-native Java microservices applications
01:32 MIN
Replacing long-lived credentials with short-lived tokens
Supply Chain Security and the Real World: Lessons From Incidents
Panel Discussion: Responsible AI in Practice - Real-World Examples and ChallengesIntroductionIn the ever-evolving landscape of artificial intelligence, the concept of "responsible AI" has emerged as a cornerstone for ethical and practical AI implementation. During the WWC24 Panel discussion, three eminent experts—Mina, Bjorn Brin...
How to Get The Most Out of a ConferenceConferences are an excellent opportunity for individuals to establish connections, acquire knowledge, and develop professionally. So It’s crucial to know how to maximise the benefits of attending one.Attending a conference without a plan of action or...
Chris Heilmann
All the videos of Halfstack London 2024!Last month was Halfstack London, a conference about the web, JavaScript and half a dozen other things. We were there to deliver a talk, but also to record all the sessions and we're happy to share them with you. It took a bit as we had to wait for th...
From learning to earning
Jobs that call for the skills explored in this talk.