Upgrade to Pro
— share decks privately, control downloads, hide ads and more …
Speaker Deck
Features
Speaker Deck
PRO
Sign in
Sign up for free
Search
Search
Zero trust architecture with Keycloak
Search
Posedio
PRO
June 12, 2024
Programming
0
230
Zero trust architecture with Keycloak
Posedio
PRO
June 12, 2024
Tweet
Share
More Decks by Posedio
See All by Posedio
API First revisited - where did we take a left turn?
posedio
PRO
0
40
Solving Multi-Tenant Challenges: Apache Airflow and Cloud Composer in Action
posedio
PRO
0
28
Contract testing with Java
posedio
PRO
0
24
Flink in two nutshells
posedio
PRO
0
24
Taming the Codebase: Strategies for Refactoring Legacy Code
posedio
PRO
0
23
Access & Usage Policies and Enforcement: Challenges and Solutions
posedio
PRO
0
18
The Future of Data Sharing
posedio
PRO
0
62
Is your spring boot application in Kubernetes secure?
posedio
PRO
0
72
Site Reliability Engineering: Getting C-Level Support
posedio
PRO
0
24
Other Decks in Programming
See All in Programming
振り返れば奴(Cline)がいる
keiyagi
0
130
SRE、開発、QAが協業して挑んだリリースプロセス改革@SRE Kaigi 2025
nealle
1
3.3k
HTML/CSS超絶浅い説明
yuki0329
0
210
富山発の個人開発サービスで日本中の学校の業務を改善した話
krpk1900
3
300
時計仕掛けのCompose
mkeeda
1
190
ESLintプラグインを使用してCDKのセオリーを適用する
yamanashi_ren01
2
380
最近のVS Codeで気になるニュース 2025/01
74th
1
240
PicoRubyと暮らす、シェアハウスハック
ryosk7
0
250
Azure AI Foundryのご紹介
qt_luigi
1
260
Linux && Docker 研修/Linux && Docker training
forrep
22
4k
知られざるDMMデータエンジニアの生態 〜かつてツチノコと呼ばれし者〜
takaha4k
3
1k
オニオンアーキテクチャを使って、 Unityと.NETでコードを共有する
soi013
0
380
Featured
See All Featured
Gamification - CAS2011
davidbonilla
80
5.1k
The Illustrated Children's Guide to Kubernetes
chrisshort
48
49k
Documentation Writing (for coders)
carmenintech
67
4.6k
Into the Great Unknown - MozCon
thekraken
34
1.6k
Bash Introduction
62gerente
610
210k
Intergalactic Javascript Robots from Outer Space
tanoku
270
27k
Optimizing for Happiness
mojombo
376
70k
A Tale of Four Properties
chriscoyier
157
23k
個人開発の失敗を避けるイケてる考え方 / tips for indie hackers
panda_program
98
18k
Fireside Chat
paigeccino
34
3.2k
Bootstrapping a Software Product
garrettdimon
PRO
305
110k
Making Projects Easy
brettharned
116
6k
Transcript
None
WHAT’S IN IT FOR ME 1. Conventional vs. zero trust
architecture 2. User identity vs. machine identity 3. Platform example vs. application example 4.What should I use in my project?
3 HI • Damjan Gjurovski • Software all-rounder J •
Set up Keycloak and zero trust in a large developer platform, worked on some Keycloak plugins
CONVENTIONAL VS. ZERO TRUST ARCHITECTURE 1
5 PERIMETER- BASED SECURITY • Network perimeter • DMZ and
internal zone • Trust those inside the zone • Check all entry points
6 ZERO TRUST • Push security controls down • Always
verify authentication and authorization • Follow the principle of least privilege
7 THE ROOT OF TRUST PROBLEM • Turtles all the
way down • Who compiles the compiler https://www.cs.cmu.edu/~rdriley/487/papers/Thompson_1984_ReflectionsonTrustingTrust.pdf
USER IDENTITY VS. MACHINE IDENTITY 2
9 USER IDENTITY • User accounts • Groups, roles, permissions
bound to work roles • Least privilege according to current task/role https://gist.github.com/angelo-v/e0208a18d455e2e6ea3c40ad637aac53
10 MACHINE IDENTITY • Service accounts • Groups and permissions
bound to use-case, type or network perimeter • Least privilege is difficult
PLATFORM EXAMPLE VS. APPLICATION EXAMPLE 3
12 THE PLATFORM • Keycloak • JWTs • Identity federation
• Istio • OAuth proxy • OPA • Vault • Kubernetes • GCP
13 PLATFORM
14 THE APPLICATION • Keycloak • OPA • Vault •
Kubernetes
WHAT SHOULD I USE IN MY PROJECT 4
16 THIS IS THE WAY • Use Keycloak J •
Use zero trust • Reconsider JWTs • Prioritize user identities
17 WANT TO KEEP THE DISCUSSION GOING? MESSAGE ME ON
LINKEDIN!