Security

Keycloak architecture diagram
Article

A deep dive into Keycloak

Stian Thorgersen +1

In this DevNation Tech Talk, we take a deep dive into Keycloak to handle open source identity and access management with modern applications and services.

SELinux Coloring Book_Tile card
E-book

SELinux Coloring Book

Dan Walsh

Learn the basics of SELinux, including type enforcement, Multi-Category Security (MCS) Enforcement, and Multi-Level Security (MLS) Enforcement, with the help of some friendly cats and dogs!

Extending Red Hat SSO
Article

Extending Red Hat SSO with IBM Security Verify

Milan Patel

Learn how IBM Security Verify provides advanced authentication to Red Hat SSO environments while also balancing id-less and password-less experiences.

Stack clash mitigation in GCC, Part 3
Article

Stack clash mitigation in GCC, Part 3

Jeff Law

Discover the design principles and performance improvements behind GCC's code generation strategies for defending against stack clash attacks.

DevNation Deep Dives
Page

DevNation Deep Dives

1-hour LIVE events that take a deep dive into the fundamentals of developer technology. Each course comes with live code and commands, and live chat Q&A with verbal responses from the presenters. 

Static analysis in GCC 10 image
Article

Static analysis in GCC 10

David Malcolm

Discover the new -fanalyzer option coming to GCC 10 that provides a static analysis pass to identify problems at compile-time, rather than at runtime.

MicroProfile JWT Cover
Cheat Sheet

MicroProfile JWT

Martin Stefanko

JSON Web Tokens (JWT) are a web standard–RFC 7519–but using them with Eclipse MicroProfile may be a mystery. This cheat sheet by Red Hat Senior Software Engineer Martin Stefanko will help you get moving immediately.

Keycloak
Article

Keycloak: Core concepts of open source identity and access management

Abhishek Koserwal

Keycloak provides the flexibility to export and import configurations easily, using a single view to manage everything. Together, these technologies let you integrate front-end, mobile, and monolithic applications into a microservice architecture. In this article, we discuss the core concepts and features of Keycloak and its application integration mechanisms. You will find links to implementation details near the end. Core concepts Let's start with Keycloak's core concepts, as shown in Figure 1: Figure 1: Keycloak's core concepts."> A Keycloak realm...

container security
Article

3 steps toward improving container security

David Strom

The basic steps of container security involve securing the build environment, securing the container hosts, and securing the content running inside.