2
Securing Your First Application
In this chapter, you will learn how to secure your first application with Keycloak. To make things a bit more interesting, the sample application you will be running consists of two parts, a frontend web application and a backend REST API. This will show you how a user can authenticate to the frontend, and also how it is able to securely invoke the backend.
By the end of this chapter, you will have a basic understanding of how applications can be secured by Keycloak by leveraging OpenID Connect.
In this chapter, we’re going to cover the following main topics:
- Understanding the sample application
- Running the application
- Understanding how to log in to the application
- Securely invoking the backend REST API
Get Keycloak - Identity and Access Management for Modern Applications - Second Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.