Introduction

Agenda

  • Basic functionality exploration, with hands-on labs to tackle common configuration challenges
  • In-depth review of OIDC, OAuth 2.0, and JWT standards, addressing common misconceptions and implementation pitfalls
  • Designing authentication flows, including real-world scenarios to understand the challenges in creating user-friendly yet secure flows
  • Sign-in and sign-up use cases, with a focus on addressing common issues in user onboarding and authentication
  • Token customization insights, exploring the nuances of customizing tokens to meet specific business requirements
  • Deployment patterns discussion, covering challenges and best practices in deploying Keycloak in various environments
  • Hands-on demonstrations with troubleshooting scenarios to enhance problem-solving skills

Challenges to Solve

Target Audience

Introduction

Agenda

  • User Federation with LDAP, including troubleshooting common integration issues
  • Integration and troubleshooting of Identity Federation with external Identity Providers
  • Implementation of Multifactor Authentication and Passwordless experiences, addressing common challenges and ensuring seamless user experiences
  • Step-up authentication strategies, addressing scenarios where stronger authentication is required
  • Hands-on demonstrations with real-world problem-solving scenarios

Challenges to Solve

Target Audience

Introduction

Agenda

  • In-depth review of Authorization Models, addressing challenges in implementing and managing access control
  • Exploration of Authorization Architecture Components, focusing on practical solutions to enhance security
  • API security overview with OAuth 2.0, UMA, and addressing challenges in zero-trust architectures
  • Analysis of RBAC, ABAC, ReBAC approaches, emphasizing the importance of flexible and scalable authorization solutions
  • Security patterns for Microservices, including addressing security and compliance issues
  • Hands-on demonstrations with real-world challenges, such as broken access control scenarios

Challenges to Solve

Target Audience