Тёмный

KEYCLOAK Restrict Client Auth (w/ Sven-Torben Janus) | Niko Köbler (@dasniko) 

Niko Köbler - Expert for Keycloak IAM & SSO
Подписаться 5 тыс.
Просмотров 3,4 тыс.
50% 1

Опубликовано:

 

21 окт 2024

Поделиться:

Ссылка:

Скачать:

Готовим ссылку...

Добавить в:

Мой плейлист
Посмотреть позже
Комментарии : 13   
@sevensolutions77
@sevensolutions77 Год назад
Many thanks Niko and Sven, this is exactly what we were looking for 👍
@ManiaticCondor
@ManiaticCondor Год назад
This extension is great, awesome work
@stephenunsure2943
@stephenunsure2943 Год назад
Great video thanks and lots of useful advice as well.
@JohannesReppin
@JohannesReppin Год назад
I like this extension since often one wants to connect an existing application with keycloak and not necessarily change the upstream source code.
@jonaskatze7045
@jonaskatze7045 3 месяца назад
Hello everyone, is it possible to give users access or deny access to clients without this extension? If there is a possibility, I would be very grateful for further information and procedures.
@manelgracia5194
@manelgracia5194 Год назад
Hi Niko. First of all, nice feature. However, I have 2 questions: 1. Would an unauthorized by not having the role or not complying with the policy count as a failure attempt in the Brute Force Protection feature? I mean, would a user unsuccessfully attempting to login several times be temporarily blocked? 2. In that case, isn't it an error to make this kind of check in the Authentication flow? In my mind, this is more related to an authorization check and it should be separate. Willing to hear your opinion on this.
@marcom.
@marcom. Год назад
Hi Niko. The final conclusion was: Prefer to put the RBAC into the application. Would be interesting to hear your thoughts when looking at some kind of service mesh inside Kubernetes. Is it a good idea to externalize the RBAC or some other kind of access policy to a sidecar proxy? And if so, how would Keycloak be integrated in such a scenario?
@dasniko
@dasniko Год назад
If you look at the sidecar as part of your application (what it is IMHO, as it is a sidecar to your app), then this would be a possible solution. Keycloak is good for authentication, not for authorization.
@marcom.
@marcom. Год назад
@@dasniko So you don't like the possibilities described in the Authorization Services Guide?
@dasniko
@dasniko Год назад
@@marcom. I don‘t like how bad it is implemented. Tools like OPA and OpenFGA are better approaches, IMHO. Also they are testable.
@vijayjagadish2235
@vijayjagadish2235 8 месяцев назад
its not working for me this authenticator execution Restrict user authentication on clients is not in my keycloak
@vijayjagadish2235
@vijayjagadish2235 8 месяцев назад
access provider also not their
Далее
Fine - Grained Authorization with Keycloak SSO
49:49
Просмотров 15 тыс.
The pain of not being able to find a software job
11:47