Securing apps and services with Red Hat single sign-on

If you have a number of applications and services, the applications may be HTML5, server-side, or mobile, while the services may be monolithic or microservices, deployed on-premise or to the cloud. You may have started looking at using a service mesh. Now, you need to easily secure all these applications and services.

Securing applications and services is no longer just about assigning a username and password. You need to manage identities. You need two-factor authentication. You need to integrate with legacy and external authentication systems. Your list of other requirements may be long. But you don’t want to develop all of this yourself—nor should you.

In this session, we’ll demonstrate how to easily secure all your applications and services—regardless of how they're implemented and hosted—with Red Hat single sign-on. After this session, you'll know how to secure your HTML5 application or service, deployed to a service mesh and everything in between. Once your applications and services are secured with Red Hat single sign-on, you'll know how to easily adopt single sign-on, two-factor authentication, social login, and other security capabilities.

  • Date:Thursday, May 10
  • Time:1:00 PM - 1:45 PM
  • Room:216
  • Location:Moscone South - 216
  • Session Type:Breakout
  • Session Code:S1045
  • Topic(s):Application development, Security
  • Technical difficulty:Working knowledge required
  • Products and Services:Community project(s)
  • Best for people who:Build applications, Design application/system architectures
  • Industry:
  • Primary solution:Middleware
  • Time slot:Afternoon
Speakers
Back