Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

Linux Foundation

Confirming Safety of IAM Specifications and their OSS Implementations - Keycloak as a Case Study

Linux Foundation via YouTube

Overview

Coursera Spring Sale
40% Off Coursera Plus Annual!
Grab it
Explore comprehensive security verification methods for identity and access management systems in this 42-minute conference talk from the Linux Foundation's Open Source Summit. Learn how to ensure the safety of IAM specifications like OpenID Connect 1.0 and OAuth 2.0, and verify that their open source implementations are secure and compliant. Discover three critical verification approaches: formal analysis for specification safety, conformance testing for correct implementation, and vulnerability testing for specification-specific security issues. Gain practical insights through a detailed case study of Keycloak, the CNCF incubating identity and access management project, examining how its implemented specifications are verified for security and compliance. Understand how to apply these verification methods to evaluate the security of IAM products you use or develop, with explanations designed to be accessible to developers who may not be familiar with formal security analysis techniques.

Syllabus

Confirming Safety of IAM Specifications and their OSS Implementations: Keycloak... Takashi Norimatsu

Taught by

Linux Foundation

Reviews

Start your review of Confirming Safety of IAM Specifications and their OSS Implementations - Keycloak as a Case Study

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.