· 6 years ago · Oct 18, 2019, 09:26 PM
1Software Engineering Security Concepts
2 OAuth
3 OpenID
4 SAML
5 UMA
6 RFCs
7 PKCE
8 Token Introspection
9 Introspection endpoint
10 Offline Introspection (public key)
11
12 Red Hat Single Sign-On Deployment
13 Bare metal clustered profile
14 JBoss Adapter
15 Openshift
16
17 JEE Security
18
19 Microservices Security
20 History, concepts and best practices of API security;
21 Caveats to expose RH-SSO to the internet or exploring some reference (public clients)
22 Architectures for internet that includes RH-SSO
23 Microprofile MP-JWT
24 Springboot
25 Javascript
26
27 3Scale Integration
28 The governance model of integrations with 3scale API Manager
29
30 Advanced Topics
31 Architecture examples from the field
32 Capacity planning
33 Migration considerations from Keycloak OSS project
34 LDAP/Kerberos
35 Cross-data Center
36 Cache externalization w/ JBoss Data Grid
37 Service Provider Interfaces
38 Custom implementations
39 Tips and Supportability
40 Custom Auth Flows
41 User Interface Customization (themes)
42 Gatekeeper (protect legacy apps)
43 Openshift Container Customization
44
45 Monitoring
46 User sessions/cache
47 Audit Logging
48
49 Governance
50 Continuous Delivery
51 Automation and management model of RH-SSO
52 Promotion of configurations
53 User administration profiles