<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: Yash Kashyap</title>
    <description>The latest articles on DEV Community by Yash Kashyap (@yashkashyap).</description>
    <link>https://dev.to/yashkashyap</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F1665543%2Fb0346919-3acf-42f9-90a1-cb437ff224f0.png</url>
      <title>DEV Community: Yash Kashyap</title>
      <link>https://dev.to/yashkashyap</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/yashkashyap"/>
    <language>en</language>
    <item>
      <title>Understanding Authentication &amp; Authorization with help of keycloak</title>
      <dc:creator>Yash Kashyap</dc:creator>
      <pubDate>Sun, 23 Jun 2024 08:27:15 +0000</pubDate>
      <link>https://dev.to/yashkashyap/understanding-authentication-authorization-with-help-of-keycloak-cdd</link>
      <guid>https://dev.to/yashkashyap/understanding-authentication-authorization-with-help-of-keycloak-cdd</guid>
      <description>&lt;p&gt;Authentication and authorization are two fundamental concepts in the realm of security, especially in computer applications.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Authentication-&lt;/strong&gt;  Authentication is the process of verifying the identity of a user, device, or entity in a computer system.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
Purpose- To confirm the identity of the user or entity.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Authorization-&lt;/strong&gt; Authorization is the process of determining what an authenticated user is allowed to do. It specifies the permissions for resources in the system.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
Purpose- To control access to resources and actions based on user privileges.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;There are lot of way to perform this in application like OAuth2.0, OIDC But all of these are paid platform for large number or advance services. &lt;/p&gt;

&lt;p&gt;So, To achieve these Services without any cost &lt;strong&gt;keycloak&lt;/strong&gt; come in the picture.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Keycloak-&lt;/strong&gt; Keycloak is an &lt;strong&gt;open-source identity and access management&lt;/strong&gt; solution developed by Red Hat. It provides authentication and authorization capabilities for modern applications and services.&lt;br&gt;
Some Key Feature about keycloack - &lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Authorization Services:&lt;/strong&gt; Fine-grained authorization policies and support for OAuth 2.0, OpenID Connect, and SAML.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Identity and Access Management (IAM):&lt;/strong&gt; Comprehensive IAM capabilities including role-based access control (RBAC) and multi-factor authentication (MFA).&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Installation and Setup for keycloak:&lt;/strong&gt;&lt;br&gt;
This is a official documentation of keycloak setup &lt;a href="https://www.keycloak.org/guides"&gt;https://www.keycloak.org/guides&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Integration-&lt;/strong&gt; &lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;OAuth 2.0 and OpenID Connect: Keycloak supports OAuth 2.0 and OpenID Connect protocols for securing applications.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;SAML: Keycloak can act as a SAML Identity Provider (IdP) and Service Provider (SP).&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Identity Providers: Integrate with external identity providers like Google, Facebook, and others for authentication.&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;I hope you learnt something new today.&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;End Note: If you check out my profile, this is my first-ever post. So please let me know how I did, and how I can improve in future. Thanks!&lt;/p&gt;
&lt;/blockquote&gt;

</description>
    </item>
    <item>
      <title>Understanding Authentication &amp; Authorization with help of keycloak</title>
      <dc:creator>Yash Kashyap</dc:creator>
      <pubDate>Sun, 23 Jun 2024 08:27:14 +0000</pubDate>
      <link>https://dev.to/yashkashyap/understanding-authentication-authorization-with-help-of-keycloak-4dl3</link>
      <guid>https://dev.to/yashkashyap/understanding-authentication-authorization-with-help-of-keycloak-4dl3</guid>
      <description>&lt;p&gt;Authentication and authorization are two fundamental concepts in the realm of security, especially in computer applications.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Authentication-&lt;/strong&gt;  Authentication is the process of verifying the identity of a user, device, or entity in a computer system.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
Purpose- To confirm the identity of the user or entity.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Authorization-&lt;/strong&gt; Authorization is the process of determining what an authenticated user is allowed to do. It specifies the permissions for resources in the system.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
Purpose- To control access to resources and actions based on user privileges.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;There are lot of way to perform this in application like OAuth2.0, OIDC But all of these are paid platform for large number or advance services. &lt;/p&gt;

&lt;p&gt;So, To achieve these Services without any cost &lt;strong&gt;keycloak&lt;/strong&gt; come in the picture.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Keycloak-&lt;/strong&gt; Keycloak is an &lt;strong&gt;open-source identity and access management&lt;/strong&gt; solution developed by Red Hat. It provides authentication and authorization capabilities for modern applications and services.&lt;br&gt;
Some Key Feature about keycloack - &lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Authorization Services:&lt;/strong&gt; Fine-grained authorization policies and support for OAuth 2.0, OpenID Connect, and SAML.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Identity and Access Management (IAM):&lt;/strong&gt; Comprehensive IAM capabilities including role-based access control (RBAC) and multi-factor authentication (MFA).&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Installation and Setup for keycloak:&lt;/strong&gt;&lt;br&gt;
This is a official documentation of keycloak setup &lt;a href="https://www.keycloak.org/guides"&gt;https://www.keycloak.org/guides&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Integration-&lt;/strong&gt; &lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;OAuth 2.0 and OpenID Connect: Keycloak supports OAuth 2.0 and OpenID Connect protocols for securing applications.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;SAML: Keycloak can act as a SAML Identity Provider (IdP) and Service Provider (SP).&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Identity Providers: Integrate with external identity providers like Google, Facebook, and others for authentication.&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;I hope you learnt something new today.&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;End Note: If you check out my profile, this is my first-ever post. So please let me know how I did, and how I can improve in future. Thanks!&lt;/p&gt;
&lt;/blockquote&gt;

</description>
    </item>
  </channel>
</rss>
