Upgrade to Pro
— share decks privately, control downloads, hide ads and more …
Speaker Deck
Features
Speaker Deck
PRO
Sign in
Sign up for free
Search
Search
Zero trust architecture with Keycloak
Search
Posedio
PRO
June 12, 2024
Programming
0
430
Zero trust architecture with Keycloak
Posedio
PRO
June 12, 2024
Tweet
Share
More Decks by Posedio
See All by Posedio
What is a platform?
posedio
PRO
0
52
Unsealing Vault
posedio
PRO
0
20
Modern data observability
posedio
PRO
0
17
Lost Jobs, Zombie Tasks and AirFlow Nightmares: A debugging Deep Dive
posedio
PRO
0
39
Designing Zero Trust Systems
posedio
PRO
0
33
Platform user's remorse
posedio
PRO
0
140
Go KonMari on your SQL
posedio
PRO
0
26
Rolling out digital receipts on GCP infrastructure
posedio
PRO
0
24
API First revisited - where did we take a left turn?
posedio
PRO
0
66
Other Decks in Programming
See All in Programming
チームのテスト力を総合的に鍛えてシフトレフトを推進する/Shifting Left with Software Testing Improvements
goyoki
4
2k
マイベストのシンプルなデータ基盤の話 - Googleスイートとのつき合い方 / mybest-simple-data-architecture-google-nized
snhryt
0
130
Introduce Hono CLI
yusukebe
6
3.3k
テーブル定義書の構造化抽出して、生成AIでDWH分析を試してみた / devio2025tokyo
kasacchiful
0
390
TransformerからMCPまで(現代AIを理解するための羅針盤)
mickey_kubo
7
6k
CSC305 Lecture 13
javiergs
PRO
0
370
AkarengaLT vol.38
hashimoto_kei
1
140
The Past, Present, and Future of Enterprise Java
ivargrimstad
0
560
ボトムアップの生成AI活用を推進する社内AIエージェント開発
aku11i
0
1.5k
Kotlinで実装するCPU/GPU 「協調的」パフォーマンス管理
matuyuhi
0
290
モテるデスク環境
mozumasu
3
1.4k
外接に惑わされない自システムの処理時間SLIをOpenTelemetryで実現した話
kotaro7750
0
200
Featured
See All Featured
jQuery: Nuts, Bolts and Bling
dougneiner
65
8k
How Fast Is Fast Enough? [PerfNow 2025]
tammyeverts
2
290
The Power of CSS Pseudo Elements
geoffreycrofte
80
6k
Visualization
eitanlees
150
16k
Become a Pro
speakerdeck
PRO
29
5.6k
Chrome DevTools: State of the Union 2024 - Debugging React & Beyond
addyosmani
9
960
The Success of Rails: Ensuring Growth for the Next 100 Years
eileencodes
46
7.8k
Design and Strategy: How to Deal with People Who Don’t "Get" Design
morganepeng
132
19k
Stop Working from a Prison Cell
hatefulcrawdad
272
21k
Evolution of real-time – Irina Nazarova, EuRuKo, 2024
irinanazarova
9
1k
We Have a Design System, Now What?
morganepeng
54
7.9k
[RailsConf 2023] Rails as a piece of cake
palkan
57
6k
Transcript
None
WHAT’S IN IT FOR ME 1. Conventional vs. zero trust
architecture 2. User identity vs. machine identity 3. Platform example vs. application example 4.What should I use in my project?
3 HI • Damjan Gjurovski • Software all-rounder J •
Set up Keycloak and zero trust in a large developer platform, worked on some Keycloak plugins
CONVENTIONAL VS. ZERO TRUST ARCHITECTURE 1
5 PERIMETER- BASED SECURITY • Network perimeter • DMZ and
internal zone • Trust those inside the zone • Check all entry points
6 ZERO TRUST • Push security controls down • Always
verify authentication and authorization • Follow the principle of least privilege
7 THE ROOT OF TRUST PROBLEM • Turtles all the
way down • Who compiles the compiler https://www.cs.cmu.edu/~rdriley/487/papers/Thompson_1984_ReflectionsonTrustingTrust.pdf
USER IDENTITY VS. MACHINE IDENTITY 2
9 USER IDENTITY • User accounts • Groups, roles, permissions
bound to work roles • Least privilege according to current task/role https://gist.github.com/angelo-v/e0208a18d455e2e6ea3c40ad637aac53
10 MACHINE IDENTITY • Service accounts • Groups and permissions
bound to use-case, type or network perimeter • Least privilege is difficult
PLATFORM EXAMPLE VS. APPLICATION EXAMPLE 3
12 THE PLATFORM • Keycloak • JWTs • Identity federation
• Istio • OAuth proxy • OPA • Vault • Kubernetes • GCP
13 PLATFORM
14 THE APPLICATION • Keycloak • OPA • Vault •
Kubernetes
WHAT SHOULD I USE IN MY PROJECT 4
16 THIS IS THE WAY • Use Keycloak J •
Use zero trust • Reconsider JWTs • Prioritize user identities
17 WANT TO KEEP THE DISCUSSION GOING? MESSAGE ME ON
LINKEDIN!