Many organizations often have existing user data-stores that hold information about users and their credentials. Typically, enterprise applications would have different user bases and the underlying user account management systems might be different for each of the applications.
To handle the complexity associated with multiple user data-stores, each application layer will have to have a suitable authentication module that handles authentication & authorization with the underlying user account management systems. This results in the proliferation of authentication modules for each application and it gets closely tied with application life-cycle.
In this session, you’ll learn how Keycloak/RHSSO provides a unified way to federate different user account systems. More specifically, you’ll see how effectively the user accounts from an external LDAP server and a MySQL database (that holds user accounts) could be federated with the help of Keycloak/RHSSO.
Continue reading “User Federation with Red Hat Single Sign On”
Security is a worry because Edge is perceived as a weak point that will provide hackers and malware with millions of new openings into the digital infrastructure that supports tomorrow’s global economy. Yet, although Edge security poses risks, and there are plenty of holes to fill, there are also many leading ICT companies that focus on the big picture and can provide end-to-end security both for individual devices and for the network as a whole.
There are two types of security with which we must concern ourselves. The first is the security of the actual Edge devices; the second is the security of the data those devices collect and send to other points in the network.
Continue reading “Is Edge Security a weak point”