Section 2: Securing Applications with Keycloak
In this section, you will understand the options available in terms of how to secure different application types, including different strategies for authorization.
This section comprises the following chapters:
- Chapter 3, Brief Introduction to Standards
- Chapter 4, Authenticating Users with OpenID Connect
- Chapter 5, Authorizing Access with OAuth 2.0
- Chapter 6, Securing Different Application Types
- Chapter 7, Integrating Applications with Keycloak
- Chapter 8, Authorization Strategies