Security

Static analysis in GCC 10 image
Article

Static analysis in GCC 10

David Malcolm

Discover the new -fanalyzer option coming to GCC 10 that provides a static analysis pass to identify problems at compile-time, rather than at runtime.

Share graphics_MicroProfile JWT
Cheat Sheet

MicroProfile JWT cheat sheet

Martin Stefanko

JSON Web Tokens (JWT) are a web standard–RFC 7519–but using them with Eclipse MicroProfile may be a mystery. This cheat sheet by Red Hat Senior Software Engineer Martin Stefanko will help you get moving immediately.

Keycloak
Article

Keycloak: Core concepts of open source identity and access management

Abhishek Koserwal

Keycloak provides the flexibility to export and import configurations easily, using a single view to manage everything. Together, these technologies let you integrate front-end, mobile, and monolithic applications into a microservice architecture. In this article, we discuss the core concepts and features of Keycloak and its application integration mechanisms. You will find links to implementation details near the end. Core concepts Let's start with Keycloak's core concepts, as shown in Figure 1: Figure 1: Keycloak's core concepts."> A Keycloak realm...

container security
Article

3 steps toward improving container security

David Strom

The basic steps of container security involve securing the build environment, securing the container hosts, and securing the content running inside.

Red Hat Enterprise Linux 8
Quickstart

RHEL 8 VirtualBox Quick Install

Mike Guerette

The key steps for installing Red Hat Enterprise Linux 8 as a VirtualBox VM to get you started with software development.

Red Hat OpenShift
Article

Five layers of security for Red Hat Data Grid on OpenShift

Kapil Shukla

This article talks about multiple layers of security available while deploying Red Hat Data Grid on OpenShift. The layers of security offer a combination of security measures provided by Data Grid as well as by OpenShift/Kubernetes.

Red Hat Middleware
Article

Red Hat Single Sign-On: Give it a try for no cost!

Nicolas Massé

This article describes how to download and install Red Hat Single Sign-On for no cost. Red Hat Single Sign-On is an easy-to-use access management tool that takes care of the details of most authentication protocols, user consent with UMA, and even access control.

Fedora logo
Article

Annocheck: Examining the contents of binary files

Nick Clifton

Annocheck a new utility to examine how a binary was built and to check that it has all of the appropriate security hardening features enabled. It also has several other modes that perform different kinds of examination of binary files.