Static analysis in GCC 10
Discover the new -fanalyzer option coming to GCC 10 that provides a static analysis pass to identify problems at compile-time, rather than at runtime.
Discover the new -fanalyzer option coming to GCC 10 that provides a static analysis pass to identify problems at compile-time, rather than at runtime.
JSON Web Tokens (JWT) are a web standard–RFC 7519–but using them with Eclipse MicroProfile may be a mystery. This cheat sheet by Red Hat Senior Software Engineer Martin Stefanko will help you get moving immediately.
Learn how to enable the use of multiple Ansible vault passwords through vault IDs to encrypt a file and a string.
Learn how to generate a JWT token and then validate it using API calls, so Keycloak's UI is not exposed to the public.
Find out how NGINX can act as a reverse proxy server for back-end applications, which can be hosted on an enterprise application server.
We show a practical example on how to secure modern applications and microservices with Red Hat Single Sign-On, Fuse and 3scale.
How to sign and verify signatures of container images using podman and skopeo
The basic steps of container security involve securing the build environment, securing the container hosts, and securing the content running inside.
See how the keycloak-saml adapter can be configured in the place of Picketlink to enable SAML-based authentication with a third-party identity provider.
We show how to simplify SSL certificates using Let's Encrypt with Apache httpd on Red Hat Enterprise Linux 7.
Learn how Keycloak can help you secure your microservices in this video demonstration from Sebastien Blanc.
Instructions in the NOP space are an attractive way to provide new performance and security features; we show how to use them effectively.
Quay.io is a container image repository that automatically scans your images for security vulnerabilities. Learn how to use this powerful feature.
We share some recent improvements for go-toolset, including a feature that lets Go call into a FIPS 140-2 validated cryptographic library.
A DevNation Live session - Easily secure your cloud-native microservices with Keycloak
In this article, we'll show how you can access Linux services remotely from .NET using SSH port forwarding.
The key steps for installing Red Hat Enterprise Linux 8 as a VirtualBox VM to get you started with software development.
This article covers how the -fstack-check capability in GCC works and explains why it is insufficient for mitigating Stack Clash attacks.
This article talks about multiple layers of security available while deploying Red Hat Data Grid on OpenShift. The layers of security offer a combination of security measures provided by Data Grid as well as by OpenShift/Kubernetes.
This article shows how to use the libFuzzer library with your applications so you can test how your applications handle arbitrary inputs from users.
This article describes how Red Hat Single Sign-On uses open source technology to provide a true multi-site single sign-on authentication platform capable of handling next-generation applications.
This article describes how to download and install Red Hat Single Sign-On for no cost. Red Hat Single Sign-On is an easy-to-use access management tool that takes care of the details of most authentication protocols, user consent with UMA, and even access control.
How to get a valid public certificate for your Red Hat Single Sign-On instance using Let's Encrypt and Lego. This avoids the inherent problems with self-signed certificates.
Annocheck a new utility to examine how a binary was built and to check that it has all of the appropriate security hardening features enabled. It also has several other modes that perform different kinds of examination of binary files.