Главная
Study mode:
on
1
Introduction
2
Agenda
3
Overview
4
NIST Framework
5
Middleware portfolio
6
Why Red Hat middleware
7
Features overview
8
BPM Suite
9
Key Cloak
10
Adaptors
11
entitlements
12
support life cycle
13
single signon
14
EAP 71
15
Certifications
16
Data at rest
17
System pattern
18
Identity provider
19
Application use cases
20
Red Hat products
21
Key Cloak features
22
Key Cloak benefits
23
Key Cloak challenges
24
Future plans
25
Questions
Description:
Explore middleware security essentials in this 54-minute Red Hat conference talk. Delve into authentication, authorization, and auditing services crucial for application security and enterprise IT control. Learn about Red Hat's security initiatives across JBoss Middleware, including JBoss Enterprise Application Platform, JBoss Fuse, and OpenShift. Discover the new single sign-on service based on Keycloak, leveraging OpenID Connect, OAuth 2.0, and SAML standards. Examine two real-world implementations: Red Hat IT's authentication and authorization services for over 500,000 users, and SWIFT's secure financial messaging services using enterprise integration patterns and Apache Camel components. Gain insights into the NIST Framework, middleware portfolio, BPM Suite, adapters, entitlements, support life cycles, EAP 7.1, certifications, data at rest, system patterns, identity providers, and application use cases. Understand Key Cloak features, benefits, challenges, and future plans for enhancing middleware security across various Red Hat products. Read more

Middleware Security - Authentication, Authorization, and Auditing Services

Red Hat
Add to list
0:00 / 0:00