Extending Keycloak: A Beginners' Guide

Posted By: ELK1nG

Extending Keycloak: A Beginners' Guide
Last updated 12/2022
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz
Language: English | Size: 4.49 GB | Duration: 3h 49m

Learn how to write Keycloak extensions the right way and get the most out your Keycloak

What you'll learn

Writing Keycloak extensions

Keycloak architecture

Overriding Keycloak functionalities

Adding new custom capabilities like Required Actions and Authentication flow executions

Customizing keycloak themes

Requirements

Java programming

Keycloak experience

Description

This course aims to provide software engineers with the necessary knowledge to get up to speed with writing Keycloak extensions. It is mostly practical and backed by several years of experience integrating Keycloak within complex systems. Many enterprises nowadays fell the need to adopt a centralized authentication/authorization solution like Keycloak, which has quickly become one of the de facto choices. Because extending Keycloak is most of the time necessary, especially if the choice of adopting Keycloak comes after your system has reached a certain level of maturity, this may create some uncertainty with regards to whether Keycloak is the right of the choice. Most of the time, it is the right choice, if the necessary ground is prepared. One of the best ways to prepare the ground for a Keycloak is to study Keycloak extension points and how to use them to fit within your specific context. The course targets software engineers from all walks of like. The only prerequisites are Java language skills and Keycloak background.This course aggregates the lessons learned from real world Keycloak set up and customization, and provides you with information that is not necessarily presented in the official documentation. It fills the gap between the Keycloak documentation and the real world settings. The course adopts a learning by doing scheme where most of the courses present a bit of theory and a live coding example. It is, as of now, the only course that deals with how to effectively extend Keycloak.   

Overview

Section 1: Keycloak architecture and design

Lecture 1 Prelude

Lecture 2 Reverse engineering Keycloak

Lecture 3 SPIs, Provider, ProviderFactory, and KeycloakSession

Section 2: Extending Keycloak

Lecture 4 Basic extension set up

Lecture 5 Extending Keycloak's existing providers

Lecture 6 Overriding Keycloak's existing providers

Lecture 7 Side Note: Provider specific config (Optional)

Lecture 8 Custom endpoints

Lecture 9 Custom endpoints (part 2): adding security

Lecture 10 Required Actions

Lecture 11 Required Actions (part2): AIAs (Application Initiated Actions)

Lecture 12 Side Note 2: Provider events

Lecture 13 Custom SPIs

Lecture 14 Authenticators (part 1): flows

Lecture 15 Authenticators (part2): implementation

Lecture 16 Custom themes

Lecture 17 Extending Keycloak's data model

Lecture 18 User Federation: Custom user storage

Lecture 19 Congrats

Backend engineers with Java and Keycloak experience