keycloak-workshop
CtrlK
  • README
  • Introduction
    • Requirements and Setup
    • Sample Application Architecture
  • Intro Labs
    • Authorization Grant Flows in Action
    • Authorization Code Grant Demo
    • GitHub Client
  • Part 1 : OAuth 2.0 and OpenID Connect 1.0
    • Resource Server
    • Client (Authorization Code Flow)
    • Client (Client Credentials Flow)
    • Testing JWT Auth&Authz
    • JWT Testing Server
    • SPA Client (Authz Code with PKCE)
  • Part 2 : Fine-grained authorization
    • Lab 7: SpringBoot REST Service Protected Using Keycloak Authorization Services
    • Lab 8: Spring Security Application using Authorization Services
    • Lab 9: SpringBoot REST Service Protected Using Keycloak Authorization Services (Javascript Policies)
    • Lab 10: User-Managed Access (UMA 2.0)
  • Part 3 : SAML
    • Lab 11: Spring Boot Application with SAML 2.0
    • Lab 12: SAML SSO using an external identity provider
  • Part 4 : User Storage Federation
    • Lab 13: User federation using LDAP
    • Lab 14: Keycloak User Storage SPI
  • Part 5 : MFA
    • Lab 15: Keycloak 2FA SMS Authenticator
    • Lab 16: Conditional Keycloak 2FA SMS Authenticator
  • Identity Brokering
    • Lab 17: Using Github as an identity provider
    • Lab 18: Using Franceconnect as an identity provider
  • Bonus Labs​
    • Multi-Tenant Resource Server
    • Micronaut
    • Quarkus
    • Keycloak Testcontainers
Powered by GitBook
On this page
  1. Identity Brokering

Lab 18: Using Franceconnect as an identity provider

TO DO

PreviousLab 17: Using Github as an identity providerNextMulti-Tenant Resource Server

Last updated 3 years ago