Keycloak IAM & SSO

2024-11-27 - 2024-11-28

Keycloak IAM & SSO (Online) - Termingarantie

Description

In this training we start with the deployment and configuration of a Keycloak server. We will learn the basics of the OAuth 2, OIDC and JWT specifications and get a common understanding of the terms used, while taking our first steps with tokens, claims and authentication. At the same time, we will also discuss the best practices and deprecations that have emerged over time in these specifications.

We then cover the configuration of realms and clients and the pitfalls to watch out for here. We can use theming to adapt the Keycloak UIs to the company or project design specifications. In addition to Keycloak’s own user management for users, groups and roles, we will learn what other options are available for using existing user sources (e.g. LDAP, etc.) and other external identity providers (e.g. Azure AD or social providers) in and with Keycloak.

The login processes (authentication flows) are a powerful tool in Keycloak. We will learn how to design and configure secure and complex authentication flows. Using Required Actions, we can ask users to perform certain actions or configure credentials.

We will also learn about the configurations required for reliable and secure operation with regard to (high availability) clusters, distributed cache, backup and recovery, as well as the most important settings for preventing or containing security threats.

[Niko gives you a summary in this video (https://www.youtube.com/watch?v=z87jE0MZvuA).

Agenda

Keycloak Server basics

  • Basics Single Sign-On (SSO) and specifications OAuth 2, OpenID Connect (OIDC) and JSON Web Token (JWT)
  • Keycloak Server configuration and deployment (incl. database)
  • First steps with tokens and claims
  • Principle and configuration of Keycloak realms
  • Client configurations in Keycloak using the example of a distributed application
  • Themeing the Keycloak forms/user interfaces

User administration and sources

  • Users, groups and roles in Keycloak
  • Clarification of the differences between User Federation / User Storage and External Identity Providers
  • Configuration of an LDAP as user federation
  • Using your own user data sources
  • Configuration of an external identity provider using the example of Azure AD / Microsoft Entra ID

Authentication flows and required actions

  • Design and configuration of authentication flows
  • Extension of the authentication options using custom extensions
  • Use of required actions
  • Configuration of additional authentication policies

Clustering and distributed caching

  • Configuration of the Keycloak server for cluster operation
  • Discussion of the various cluster discovery protocols
  • Customization / tuning of the (distributed) cache configuration

Further topics

  • Versions & upgrades
  • Backup & recovery
  • Mitigating security threats

Your Trainers

Niko Köbler

Niko Köbler IT-Beratung

Keycloak, IAM

  • Develop Keycloak extensions
  • Keycloak IAM & SSO
  • Keycloak and OIDC

Niko Köbler ist Freelancer und seit über acht Jahren als Keycloak- und IAM-Experte für Kunden aus unterschiedlichen Branchen europaweit tätig. Auf YouTube betreibt er seit Anfang 2021 einen erfolgreichen Keycloak-Channel und unterstützt die Community in verschiedenen Foren. Außerdem ist er ein bekannter und gefragter Sprecher auf IT-Konferenzen, Co-Lead einer Java User Group und schreibt als Autor Artikel für verschiedene Fachzeitschriften. https://www.n-k.de

All info about training