<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>Authentication on Janik von Rotz</title>
    <link>https://janikvonrotz.ch/tags/authentication/</link>
    <description>Recent content in Authentication on Janik von Rotz</description>
    <generator>Hugo</generator>
    <language>en-us</language>
    <lastBuildDate>Thu, 27 Aug 2020 17:18:30 +0200</lastBuildDate>
    <atom:link href="https://janikvonrotz.ch/tags/authentication/index.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>Grafana OAuth with Keycloak and how to validate a JWT token</title>
      <link>https://janikvonrotz.ch/2020/08/27/grafana-oauth-with-keycloak-and-how-to-validate-a-jwt-token/</link>
      <pubDate>Thu, 27 Aug 2020 17:18:30 +0200</pubDate>
      <guid>https://janikvonrotz.ch/2020/08/27/grafana-oauth-with-keycloak-and-how-to-validate-a-jwt-token/</guid>
      <description>&lt;p&gt;In this tutorial I am going to show how you can connect a &lt;a href=&#34;https://grafana.com/&#34;&gt;Garafana&lt;/a&gt; container that is hidden behind proxy with Keycloak. We want to log into Grafana with a Keycloak user and experience a seamless SSO-flow. Therefore we are going to configure an OAuth client for Grafana.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Odoo OAuth authentication with Keycloak</title>
      <link>https://janikvonrotz.ch/2020/04/24/odoo-oauth-authentication-with-keycloak/</link>
      <pubDate>Fri, 24 Apr 2020 17:08:49 +0200</pubDate>
      <guid>https://janikvonrotz.ch/2020/04/24/odoo-oauth-authentication-with-keycloak/</guid>
      <description>&lt;h1 id=&#34;introduction&#34;&gt;Introduction&lt;/h1&gt;&#xA;&lt;p&gt;OAuth is an authorization framework that enables applications to obtain limited access to user accounts on an HTTP service. It works by delegating user authentication to the service that hosts the user account, and authorizing third-party applications to access the user account.&lt;/p&gt;&#xA;&lt;p&gt;In our scenario Keycloak acts as the OAuth service and Odoo as the application that delegates the user authentication. In this guide you learn how to configure Odoo and Keycloak to handle an implicit OAuth flow.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Configure SAML Authentication for Nextcloud with Keycloack</title>
      <link>https://janikvonrotz.ch/2020/04/21/configure-saml-authentication-for-nextcloud-with-keycloack/</link>
      <pubDate>Tue, 21 Apr 2020 12:05:28 +0200</pubDate>
      <guid>https://janikvonrotz.ch/2020/04/21/configure-saml-authentication-for-nextcloud-with-keycloack/</guid>
      <description>&lt;h1 id=&#34;introduction&#34;&gt;Introduction&lt;/h1&gt;&#xA;&lt;p&gt;The complex problems of identity and access management (IAM) have challenged big companies and in result we got powerful protocols, technologies and concepts such as SAML, oAuth, Keycloack, tokens and much more.&lt;/p&gt;&#xA;&lt;p&gt;The goal of IAM is simple. Centralize all identities, policies and get rid of application identity stores. Not only is more secure to manage logins in one place, but you can also offer a better user experience. As the title says we want to connect our centralized identity management software Keycloack with our application Nextcloud.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Build an Apollo Graphql user authentication for your React app - part 3</title>
      <link>https://janikvonrotz.ch/2019/09/26/build-an-apollo-graphql-user-authentication-for-your-react-app-part-3/</link>
      <pubDate>Thu, 26 Sep 2019 10:31:27 +0200</pubDate>
      <guid>https://janikvonrotz.ch/2019/09/26/build-an-apollo-graphql-user-authentication-for-your-react-app-part-3/</guid>
      <description>&lt;p&gt;This is the final post of my GraphQL Auth series. Before reading this post checkout &lt;a href=&#34;https://janikvonrotz.ch/2019/08/27/build-an-apollo-graphql-user-authentication-for-your-react-app-part-1&#34;&gt;post 1&lt;/a&gt; and &lt;a href=&#34;https://janikvonrotz.ch/2019/08/29/build-an-apollo-graphql-user-authentication-for-your-react-app-part-2&#34;&gt;post 2&lt;/a&gt;.&lt;/p&gt;&#xA;&lt;p&gt;As mentioned in my last post we need to polish our authentication solution. First we wanna ensure that the JWT token expires. Second, I think the &lt;code&gt;isAuthenticated&lt;/code&gt; directive is insufficient for proper permission management on our types, queries and mutations. We need a role based solution. While the first point is simple to implement, the second is more complex and definitely requires walking through the previous posts.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Build an Apollo Graphql user authentication for your React app - part 2</title>
      <link>https://janikvonrotz.ch/2019/08/29/build-an-apollo-graphql-user-authentication-for-your-react-app-part-2/</link>
      <pubDate>Thu, 29 Aug 2019 19:34:07 +0200</pubDate>
      <guid>https://janikvonrotz.ch/2019/08/29/build-an-apollo-graphql-user-authentication-for-your-react-app-part-2/</guid>
      <description>&lt;p&gt;In my &lt;a href=&#34;https://janikvonrotz.ch/2019/08/27/build-an-apollo-graphql-user-authentication-for-your-react-app-part-1&#34;&gt;last post&lt;/a&gt; we built a Graphql API that handles user authentication and authorization. In particular we added a &lt;code&gt;loginUser&lt;/code&gt; query that returns a JWT token. This token can be used to access restricted resources.&#xA;In this post I will show what the implementation looks like on Reacts side.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Build an Apollo Graphql user authentication for your React app - part 1</title>
      <link>https://janikvonrotz.ch/2019/08/27/build-an-apollo-graphql-user-authentication-for-your-react-app-part-1/</link>
      <pubDate>Tue, 27 Aug 2019 18:35:12 +0200</pubDate>
      <guid>https://janikvonrotz.ch/2019/08/27/build-an-apollo-graphql-user-authentication-for-your-react-app-part-1/</guid>
      <description>&lt;p&gt;I am currently building an &lt;a href=&#34;https://www.apollographql.com/docs/apollo-server/&#34;&gt;Apollo Graphql&lt;/a&gt; API and a &lt;a href=&#34;https://reactjs.org/&#34;&gt;React&lt;/a&gt; web application. The application requires a user authentication functionality in order to enforce access restrictions on the Graphql endpoint. Apollo Graphql does not provide an out-of-the-box-solution and therefore I would like to present my solution.&lt;/p&gt;</description>
    </item>
    <item>
      <title>The Future of Authentication</title>
      <link>https://janikvonrotz.ch/2019/01/07/the-future-of-authentication/</link>
      <pubDate>Mon, 07 Jan 2019 09:06:27 +0100</pubDate>
      <guid>https://janikvonrotz.ch/2019/01/07/the-future-of-authentication/</guid>
      <description>&lt;p&gt;The world is changing and so does it in 2019. Time to make so predictions for the new year.&lt;/p&gt;&#xA;&lt;p&gt;I firmly believe that we will see huge progress in the field of secure user authentication. As you might know the current state of authentication is fundamentally flawed. Users set weak passwords, 2-factor authentication is a usability mess and &lt;a href=&#34;https://haveibeenpwned.com/&#34;&gt;accounts are compromised on a daily basis&lt;/a&gt;. These problems are well known and big tech companies have tried to tackle them on their own.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Meteor register LDAP login request handler</title>
      <link>https://janikvonrotz.ch/2017/02/08/meteor-register-ldap-login-request-handler/</link>
      <pubDate>Wed, 08 Feb 2017 20:53:56 +0000</pubDate>
      <guid>https://janikvonrotz.ch/2017/02/08/meteor-register-ldap-login-request-handler/</guid>
      <description>&lt;p&gt;One requirement for my current Meteor project was that a user must login with their ActiveDirectory account. This means that Meteor must be able to authenticate against LDAP. In atmosphere there are already a few packages available which implement and support LDAP authentication. However, they are either outdated or difficult to configure. This is why I&amp;rsquo;ve decided to build my own custom login request handler for Meteor.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Authenticate Meteor accounts with the Apollo GraphQL API</title>
      <link>https://janikvonrotz.ch/2016/11/12/authenticate-meteor-accounts-with-the-apollo-graphql-api/</link>
      <pubDate>Sat, 12 Nov 2016 10:21:20 +0000</pubDate>
      <guid>https://janikvonrotz.ch/2016/11/12/authenticate-meteor-accounts-with-the-apollo-graphql-api/</guid>
      <description>&lt;p&gt;One of the popular features of Meteor is its accounts package. As you know, it makes it fairly easy to add a user authentication solution to your Meteor app or add support for different oAuth services. With the possibility to integrate an Apollo GraphQL API into your Meteor app this became a bit more difficult. The Apollo stack does not support an out of the box solutions to authenticate users with Meteor accounts. Jonas Helfer, one of the Apollo core devs, proposed &lt;a href=&#34;https://dev-blog.apollodata.com/a-guide-to-authentication-in-graphql-e002a4039d1&#34;&gt;two ways to authenticate users with your app&lt;/a&gt;:&lt;/p&gt;</description>
    </item>
    <item>
      <title>Build a Java 3-tier application from scratch – Part 5: Client controller</title>
      <link>https://janikvonrotz.ch/2015/04/01/build-a-java-3-tier-application-from-scratch-part-5-client-controller/</link>
      <pubDate>Wed, 01 Apr 2015 09:27:32 +0000</pubDate>
      <guid>https://janikvonrotz.ch/2015/04/01/build-a-java-3-tier-application-from-scratch-part-5-client-controller/</guid>
      <description>&lt;p&gt;As you&amp;rsquo;ve seen there are 5 models in our application. This is not that much but requires a lot of effort to display them in the client application. As this tutorial doesn&amp;rsquo;t cover every aspect of a rich 3-tier applicatoin I will show only how you can authenticate the client application and edit the Employer entities.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Build a Java 3-tier application from scratch – Part 3: Object-relational mapping</title>
      <link>https://janikvonrotz.ch/2015/03/30/build-a-java-3-tier-application-from-scratch-part-3-object-relational-mapping/</link>
      <pubDate>Mon, 30 Mar 2015 16:41:24 +0000</pubDate>
      <guid>https://janikvonrotz.ch/2015/03/30/build-a-java-3-tier-application-from-scratch-part-3-object-relational-mapping/</guid>
      <description>&lt;p&gt;Welcome to third part of my 3-tier application tutorial. Within this and the next part we are going to develope simple webservice that communicates with the database and maps Java objects to data tables.&#xA;We will create a controller that communicates with our MySQL database using the EclipseLink ORM to abstract this process.&lt;/p&gt;&#xA;&lt;p&gt;Here&amp;rsquo;s a picture of what we want to achieve. A simple webservice that&amp;rsquo;s serves depending on the url an array of json data.&lt;/p&gt;&#xA;&lt;p&gt;&lt;img src=&#34;https://janikvonrotz.ch/wp-content/uploads/2015/03/Java-3-tier-webservice.png&#34; alt=&#34;Java 3-tier webservice&#34;&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Do not forget to update to Microsoft Office 2013 when using Office 365 or SharePoint Online</title>
      <link>https://janikvonrotz.ch/2013/12/16/do-not-forget-to-update-to-microsoft-office-2013-when-using-office-365-or-sharepoint-online/</link>
      <pubDate>Mon, 16 Dec 2013 18:07:01 +0000</pubDate>
      <guid>https://janikvonrotz.ch/2013/12/16/do-not-forget-to-update-to-microsoft-office-2013-when-using-office-365-or-sharepoint-online/</guid>
      <description>&lt;p&gt;When deploying a published SharePoint 2013 on-premise installation or a Office 365 installation or a SharePoint Online installation, it&amp;rsquo;s highly recommended to update your Microsoft Office 2013 installation.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Office365 ADFS Chrome Login fails</title>
      <link>https://janikvonrotz.ch/2013/09/10/office365-adfs-chrome-login-fails/</link>
      <pubDate>Tue, 10 Sep 2013 13:49:40 +0000</pubDate>
      <guid>https://janikvonrotz.ch/2013/09/10/office365-adfs-chrome-login-fails/</guid>
      <description>&lt;p&gt;Today I experienced an exotic behaviour, a client couldn&amp;rsquo;t access his Office365 page due he wasn&amp;rsquo;t able to login on the ADFS authentication prompt.&lt;/p&gt;&#xA;&lt;p&gt;After googling and binging (just kidding, &lt;em&gt;NERD&lt;/em&gt;) I found a simple &lt;a href=&#34;https://stackoverflow.com/questions/5436441/adfs-authentication-ie8-works-chrome-fails&#34; target=&#34;_blank&#34;&gt;solution&lt;/a&gt;.&lt;/p&gt;</description>
    </item>
  </channel>
</rss>
