Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

Linux Foundation

Guide to Authentication and Authorization for Cloud Native Applications with Keycloak

Linux Foundation via YouTube

Overview

Explore authentication and authorization for cloud native applications using Keycloak in this informative 34-minute video presentation by Michito Okai from Hitachi, Ltd. Learn how to mitigate security risks such as Broken Access Control and Broken Authentication in cloud-native environments. Discover the benefits of Keycloak, an Identity and Access Management open-source software that joined CNCF as an incubating project. Understand how Keycloak enables Single Sign-On, passwordless authentication, and social login for administrators and users. Gain insights into Keycloak's adherence to OAuth 2.0 and highly secured profiles like Financial-grade API for microservices. Explore use cases for implementing authorization using IoT devices with Kubernetes through Keycloak. Delve into why Keycloak is becoming a preferred choice for authentication and authorization in cloud-native applications.

Syllabus

Guide of Authentication and Authorization for Cloud Native Applications with Keycloak - Michito Okai

Taught by

Linux Foundation

Reviews

Start your review of Guide to Authentication and Authorization for Cloud Native Applications with Keycloak

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.