SlideShare a Scribd company logo
Building secure
applications with
keycloak (OIDC/JWT)
Abhishek Koserwal
Red Hat
Agenda
● IAAA Security factor
● Oauth2/OpenID
● Why? Keycloak
● OIDC/SAML - Keycloak adapters
(which & why?)
● Understanding Json Web Token (JWT)
● Integrating frontend(Angular/React)
with keycloak adapter. -
● Access token/refresh token
● JWT Validation at backend & securing
API endpoints
● Q & A
● Identification: set of attributes related to an entity
(person -> attribute [name, email] )
● Authentication: is the process of verifying an identity (who they say they are)
● Authorization: is the process of verifying what someone is allowed to do
(permissions)
● Accounting: logs, user action, traceability of action
IAAA Security Factor
Are we using
Oauth2/OpenID?
Delegation Auth
Allow website to access my data
without providing my password?
➔ Authentication/Identity Level
➔ Authorization/Access Control
Level
➔ Site needs to manage security
➔ Store hash password, verify the hash
against a database
● Oauth2 != Authentication, only Authorization
● Access Granting Protocol
● Delegated access
OAuth2/OpenID?
● Identity, Authentication + Oauth2 = OpenID
Connect
● Federation
Why? Keycloak
● Open source Identity and Access Management solution (https://github.com/keycloak/keycloak)
● Browsers, mobiles and clouds
● Many accounts
● Admin headache
Features
● SSO
● Admin console
● Login forms
● Account management
● Multi-factor auth
● Social login
● ..
Setup: keycloak
docker pull jboss/keycloak
docker run -d -e KEYCLOAK_USER=<USERNAME> -e KEYCLOAK_PASSWORD=<PASSWORD> -p 8081:8080 jboss/keycloak
Require docker daemon running
Standalone server distribution
(https://www.keycloak.org/downloads.htm)
Draft: building secure applications with keycloak (oidc/jwt)

More Related Content

PPTX
Building secure applications with keycloak
PDF
Secure Spring Boot Microservices with Keycloak
PPTX
Secure your app with keycloak
PDF
OAuth 2.0
PDF
SAML VS OAuth 2.0 VS OpenID Connect
PDF
Spring security oauth2
PPTX
Identity management and single sign on - how much flexibility
PDF
Spring Security
Building secure applications with keycloak
Secure Spring Boot Microservices with Keycloak
Secure your app with keycloak
OAuth 2.0
SAML VS OAuth 2.0 VS OpenID Connect
Spring security oauth2
Identity management and single sign on - how much flexibility
Spring Security

What's hot (20)

PPTX
Spring Security 5
PPTX
Json Web Token - JWT
PDF
“How to Secure Your Applications With a Keycloak?
PPT
OAuth 2.0 and OpenId Connect
PDF
Spring boot
PDF
Spring Framework - AOP
PPTX
Keycloak for Science Gateways - SGCI Technology Sampler Webinar
PPTX
OAuth in the Wild
PDF
Keycloak Single Sign-On
PPTX
Managing Egress with Istio
PPTX
OpenID Connect: An Overview
PDF
Demystifying SAML 2.0,Oauth 2.0, OpenID Connect
PDF
OAuth2 and Spring Security
PPSX
Rest api standards and best practices
PDF
PDF
英国オープンバンキング技術仕様の概要
PDF
Introduction to OpenID Connect
PPTX
User Management Life Cycle with Keycloak
PDF
OpenID Connect Explained
Spring Security 5
Json Web Token - JWT
“How to Secure Your Applications With a Keycloak?
OAuth 2.0 and OpenId Connect
Spring boot
Spring Framework - AOP
Keycloak for Science Gateways - SGCI Technology Sampler Webinar
OAuth in the Wild
Keycloak Single Sign-On
Managing Egress with Istio
OpenID Connect: An Overview
Demystifying SAML 2.0,Oauth 2.0, OpenID Connect
OAuth2 and Spring Security
Rest api standards and best practices
英国オープンバンキング技術仕様の概要
Introduction to OpenID Connect
User Management Life Cycle with Keycloak
OpenID Connect Explained
Ad

Similar to Draft: building secure applications with keycloak (oidc/jwt) (20)

PDF
Java EE Application Security With PicketLink
PDF
Using Postman to Test OAuth/OIDC
PDF
Serverless Meetup - Authentication for Serverless Applications [Jul 2020]
PDF
Auth experience - vol 1.0
PDF
JavaOne 2014 - Securing RESTful Resources with OAuth2
PDF
Authentication in microservice systems - fsto 2017
PPTX
Building IAM for OpenStack
PDF
2016 pycontw web api authentication
PDF
RoadSec 2017 - Trilha AppSec - APIs Authorization
PDF
Open Source Identity and Access management with Keycloak.pdf
PPTX
Configuring Single Sign-On (SSO) via Identity Management | MuleSoft Mysore Me...
PDF
Securing FIWARE Architectures
PDF
Getting Started with FIDO2
PPTX
Intro to Apache Shiro
PDF
GDG Cloud Taipei: Meetup #52 - Istio Security: API Authorization
PPT
Extending Oracle SSO
PPTX
CBSecurity 3 - Secure Your ColdBox Applications
PDF
Building an Effective Architecture for Identity and Access Management.pdf
PPTX
How to Use Stormpath in angular js
PDF
Super simple application security with Apache Shiro
Java EE Application Security With PicketLink
Using Postman to Test OAuth/OIDC
Serverless Meetup - Authentication for Serverless Applications [Jul 2020]
Auth experience - vol 1.0
JavaOne 2014 - Securing RESTful Resources with OAuth2
Authentication in microservice systems - fsto 2017
Building IAM for OpenStack
2016 pycontw web api authentication
RoadSec 2017 - Trilha AppSec - APIs Authorization
Open Source Identity and Access management with Keycloak.pdf
Configuring Single Sign-On (SSO) via Identity Management | MuleSoft Mysore Me...
Securing FIWARE Architectures
Getting Started with FIDO2
Intro to Apache Shiro
GDG Cloud Taipei: Meetup #52 - Istio Security: API Authorization
Extending Oracle SSO
CBSecurity 3 - Secure Your ColdBox Applications
Building an Effective Architecture for Identity and Access Management.pdf
How to Use Stormpath in angular js
Super simple application security with Apache Shiro
Ad

Recently uploaded (20)

PPTX
English-9-Q1-3-.pptxjkshbxnnxgchchxgxhxhx
PDF
oil_refinery_presentation_v1 sllfmfls.pdf
PDF
natwest.pdf company description and business model
PPTX
The Effect of Human Resource Management Practice on Organizational Performanc...
PPTX
Primary and secondary sources, and history
PPTX
Emphasizing It's Not The End 08 06 2025.pptx
PPTX
fundraisepro pitch deck elegant and modern
PPTX
Introduction-to-Food-Packaging-and-packaging -materials.pptx
PPTX
S. Anis Al Habsyi & Nada Shobah - Klasifikasi Hambatan Depresi.pptx
PPTX
Introduction to Effective Communication.pptx
PPTX
Anesthesia and it's stage with mnemonic and images
PDF
Tunisia's Founding Father(s) Pitch-Deck 2022.pdf
DOCX
"Project Management: Ultimate Guide to Tools, Techniques, and Strategies (2025)"
PDF
Parts of Speech Prepositions Presentation in Colorful Cute Style_20250724_230...
PPT
First Aid Training Presentation Slides.ppt
PPTX
An Unlikely Response 08 10 2025.pptx
PPTX
Tablets And Capsule Preformulation Of Paracetamol
PPTX
Relationship Management Presentation In Banking.pptx
PPTX
Presentation for DGJV QMS (PQP)_12.03.2025.pptx
PDF
Presentation1 [Autosaved].pdf diagnosiss
English-9-Q1-3-.pptxjkshbxnnxgchchxgxhxhx
oil_refinery_presentation_v1 sllfmfls.pdf
natwest.pdf company description and business model
The Effect of Human Resource Management Practice on Organizational Performanc...
Primary and secondary sources, and history
Emphasizing It's Not The End 08 06 2025.pptx
fundraisepro pitch deck elegant and modern
Introduction-to-Food-Packaging-and-packaging -materials.pptx
S. Anis Al Habsyi & Nada Shobah - Klasifikasi Hambatan Depresi.pptx
Introduction to Effective Communication.pptx
Anesthesia and it's stage with mnemonic and images
Tunisia's Founding Father(s) Pitch-Deck 2022.pdf
"Project Management: Ultimate Guide to Tools, Techniques, and Strategies (2025)"
Parts of Speech Prepositions Presentation in Colorful Cute Style_20250724_230...
First Aid Training Presentation Slides.ppt
An Unlikely Response 08 10 2025.pptx
Tablets And Capsule Preformulation Of Paracetamol
Relationship Management Presentation In Banking.pptx
Presentation for DGJV QMS (PQP)_12.03.2025.pptx
Presentation1 [Autosaved].pdf diagnosiss

Draft: building secure applications with keycloak (oidc/jwt)

  • 1. Building secure applications with keycloak (OIDC/JWT) Abhishek Koserwal Red Hat
  • 2. Agenda ● IAAA Security factor ● Oauth2/OpenID ● Why? Keycloak ● OIDC/SAML - Keycloak adapters (which & why?) ● Understanding Json Web Token (JWT) ● Integrating frontend(Angular/React) with keycloak adapter. - ● Access token/refresh token ● JWT Validation at backend & securing API endpoints ● Q & A
  • 3. ● Identification: set of attributes related to an entity (person -> attribute [name, email] ) ● Authentication: is the process of verifying an identity (who they say they are) ● Authorization: is the process of verifying what someone is allowed to do (permissions) ● Accounting: logs, user action, traceability of action IAAA Security Factor
  • 4. Are we using Oauth2/OpenID? Delegation Auth Allow website to access my data without providing my password? ➔ Authentication/Identity Level ➔ Authorization/Access Control Level ➔ Site needs to manage security ➔ Store hash password, verify the hash against a database
  • 5. ● Oauth2 != Authentication, only Authorization ● Access Granting Protocol ● Delegated access OAuth2/OpenID? ● Identity, Authentication + Oauth2 = OpenID Connect ● Federation
  • 6. Why? Keycloak ● Open source Identity and Access Management solution (https://github.com/keycloak/keycloak) ● Browsers, mobiles and clouds ● Many accounts ● Admin headache Features ● SSO ● Admin console ● Login forms ● Account management ● Multi-factor auth ● Social login ● ..
  • 7. Setup: keycloak docker pull jboss/keycloak docker run -d -e KEYCLOAK_USER=<USERNAME> -e KEYCLOAK_PASSWORD=<PASSWORD> -p 8081:8080 jboss/keycloak Require docker daemon running Standalone server distribution (https://www.keycloak.org/downloads.htm)

Editor's Notes

  • #6: https://tools.ietf.org/html/rfc6749 https://openid.net/connect/
  • #8: https://www.keycloak.org/downloads.html