Overview
Explore middleware security essentials in this 54-minute Red Hat conference talk. Delve into authentication, authorization, and auditing services crucial for application security and enterprise IT control. Learn about Red Hat's security initiatives across JBoss Middleware, including JBoss Enterprise Application Platform, JBoss Fuse, and OpenShift. Discover the new single sign-on service based on Keycloak, leveraging OpenID Connect, OAuth 2.0, and SAML standards. Examine two real-world implementations: Red Hat IT's authentication and authorization services for over 500,000 users, and SWIFT's secure financial messaging services using enterprise integration patterns and Apache Camel components. Gain insights into the NIST Framework, middleware portfolio, BPM Suite, adapters, entitlements, support life cycles, EAP 7.1, certifications, data at rest, system patterns, identity providers, and application use cases. Understand Key Cloak features, benefits, challenges, and future plans for enhancing middleware security across various Red Hat products.
Syllabus
Introduction
Agenda
Overview
NIST Framework
Middleware portfolio
Why Red Hat middleware
Features overview
BPM Suite
Key Cloak
Adaptors
entitlements
support life cycle
single signon
EAP 71
Certifications
Data at rest
System pattern
Identity provider
Application use cases
Red Hat products
Key Cloak features
Key Cloak benefits
Key Cloak challenges
Future plans
Questions
Taught by
Red Hat