Security for developers
Improve your application's security and close vulnerabilities with improved
Improve your application's security and close vulnerabilities with improved
Video: Security Considerations for Container Runtimes. Explains/demonstrates using Kubernetes with different security features for your container environment.
Develop applications on the most popular Linux for the enterprise.
For times when you can't use ssh-copy-id to add your public key to a server, this article explains how to do it manually and set the correct permissions.
This post describes how to secure ASP.NET Core applications on OpenShift using HTTPS for two use-cases: terminating SSL in OpenShift for public routes and terminating SSL in ASP.NET Core directly using OpenShift-generated service certificates.
Learn how to secure your APIs using OIDC authentication via an external Identity Provider such as the IdPs from Microsoft and Oracle with Red Hat 3scale API Management.
Learn how to configure NGINX to use Keycloak/Red Hat SSO for authentication with OAuth/OIDC for federated identity. In this setup, Keycloak will act as an authorization server in OAuth-based SSO and NGINX will be the relaying party.
This post shows how to set up LDAP authentication on Red Hat AMQ 7. As part of the procees, it describes how to configure AMQ to authenticate users from LDAP and allow only users from a specified group to access the AMQ management console and publish messages in queues.
This session will give you a great introduction to Keycloak, an open source identity and access management solution for modern applications and services.
Watch this DevNation Live video to learn how to secure apps and services with Keycloak. Examples shown cover REST with Node.js, PHP, and HTML5.
In this session, we’ll demonstrate how to easily secure all of your applications and services, regardless of how they're implemented and hosted, with Keycloak.
To detect common programming errors, GCC 8 contains a number of new warnings and enhancements to existing checkers to help find non-obvious bugs in C and C++ code. This article focuses on those that deal with inadvertent string truncation and discusses some of the approaches to avoiding the underlying problems.
Elytron is a new security framework that ships with WildFly version 10 and Red Hat JBoss Enterprise Application Platform (EAP) 7.1. Elytron is a replacement of PicketBox and JAAS. It is a single security framework that can be used for both securing applications and management access to Wildfly/JBoss.
Tutorials and training on how to build secure applications using the latest in
In this article, we’ll demonstrate how Red Hat Mobile v4 and OpenShift v3 enable customers to rapidly deploy and secure their mobile applications by integrating with a third party product provided by Intercede. We’ll be using Intercede’s RapID product to enable two-way TLS.
In a few weeks, the Fast Datapath Production channel will update the Open vSwitch version from the 2.7 series to the 2.9 series. This is an important change, a wealth of new features and fixes all related to packet movement will come into play.
How implement a Single Sign-on (a.k.a. SSO) in your application with an easy and OpenSource project? The answers is Keycloak, further info read the article!
This article shows Redhat 3Scale integration with ForgeRock using OpenID Connect. We will show how to integrate ForgeRock with 3scale by Red Hat. ForgeRock is one of the popular and growing identity management companies.
API management, such as Red Hat's 3scale evolved to meet the challenges that arise from making APIs available to client applications. Learn how how an existing Identity and Access Management (IAM) solution, can be integrated with an Identity Providers (IdP) to provide secure access to API endpoints using 3scale.
In this session, we’ll discover KeyCloak progressively and in an interactive way: No slides, just 100% live coding; focused on the Spring Boot adapter provided by Keycloak.
Compiled files, often called binaries, are a mainstay of modern computer systems. It is often hard for system builders and users to find out more than just very basic information about these files. The Annobin project exists as means to understand how the binary was built and what testing was performed on the binary.
How to integrate RH-SSO 7.x with Liferay DXP using SAML protocol. The aim of this tutorial is to configure Red Hat Single Sign On (RH-SSO) to work as an Identity Provider (IdP) for Liferay DXP through SAML.
you have a remote Enterprise JavaBeans (EJB) application where the EJB client is a service pack (SP) application in a Security Assertion Markup Language (SAML) architecture. You would like your remote EJB to be authenticated using same assertion which was used for SP.