Keycloak: Sso Course From Zero To Hero - Printable Version +- Softwarez.Info - Software's World! (https://softwarez.info) +-- Forum: Library Zone (https://softwarez.info/Forum-Library-Zone) +--- Forum: Video Tutorials (https://softwarez.info/Forum-Video-Tutorials) +--- Thread: Keycloak: Sso Course From Zero To Hero (/Thread-Keycloak-Sso-Course-From-Zero-To-Hero) |
Keycloak: Sso Course From Zero To Hero - AD-TEAM - 12-13-2024 Keycloak: Sso Course From Zero To Hero Last updated 8/2024 MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz Language: English (US) | Size: 1.49 GB | Duration: 4h 36m SSO with Keycloak, IAM, Keycloak API, Integration with Spring Boot, Angular, Fast API, React and Event Listeners. What you'll learn Understand the benefits of using keycloak in our full-stack application How to Install keycloak on various OS ? How to use keycloak and the various functionality it is offering ? Authentication & Authorization with Keycloak Using Keycloak RestAPIs Extending Keycloak: Creating Keycloak Custom Templates Keycloak Integration with FastAPI as a backend application Keycloak Integration with React as a frontend application Keycloak Event Listeners Keycloak Sprint Boot Integration Requirements No programming experience is required, You will learn everything you need to know Description In this course, you will learn Keycloak, an open-source software product that allows single sign-on with Identity and Access Management aimed at modern applications.Keycloak is an open-source tool that provides identity and access management for web applications and services. It supports standard protocols such as OpenID Connect, OAuth 2.0, and SAML 2.0, and offers features such as single sign-on, user federation, social login, and authorization policies. Here are some possible use cases for Keycloak:1. Secure microservices and APIs: Keycloak can be used to secure microservices and APIs by providing authentication and access control based on standard protocols like OpenID Connect and OAuth 2.0. This ensures that only authorized users and applications can access your services, helping to maintain the security and integrity of your infrastructure.2. Integrate with external identity providers: Keycloak can act as an identity broker that allows users to authenticate with external identity providers, such as Google, Facebook, or LDAP. This simplifies the user experience and reduces the need to manage multiple user accounts and passwords. Keycloak can also synchronize user data and attributes from external sources, and map them to roles and groups within Keycloak.3. Customize and extend Keycloak: Keycloak is highly configurable and extensible, allowing you to customize its look and feel, add new features, and integrate with other systems. You can use themes, templates, and internationalization to change the appearance of Keycloak's user interface. You can also use extensions, such as SPIs, event listeners, and user storage providers, to add new functionality and logic to Keycloak. You can also use REST APIs and an admin console to manage Keycloak programmatically. Who this course is for: Cyber Security Expert,Backend Developers,Full-Stack Developers,Python Developers For More Courses Visit & Bookmark Your Preferred Language Blog From Here: - - - - - - - - |