I’m wondering if it’s possible to setup Keycloak In High-Availability. If yes could you give some advices ?
Yes it`s possible
Have you considered to check Keycloak documentation regarding this topic?
https://www.keycloak.org/docs/latest/server_installation/index.html#_clustering
https://www.keycloak.org/docs/latest/server_installation/#_operating-mode (e.g. Standalone Clustered Mode)
If you need additional help, please add more information to your question. But it would be nice if you read the documentation first :-)
Related
I plan to use Keycloak as our primary login app, but before i move forward with deployment, i need to address one concern. The issue arose when i enabled mod-security on the Apache server. This resulted in several Keycloak screens and operations becoming blocked, including the ability to update the theme. if i disable the mod-security everything works fine
am i doing anything wrong or am i miss some kind of setting for mod-security in keycloak
kindly suggest some solution
I try to disable few rules, but there are too many and also for disabling rule, i need to provide some proper reason to do so.
OWASP ModSecurity Core Rule Set Dev on Duty here. Are you using the Core Rule Set (CRS)? Are those the rules you are having trouble with, or are you using some other rule set? Please confirm.
Assuming you are using CRS, have you tuned your WAF installation for your web application (Keycloak)? Tuning is a required step before CRS can be properly and correctly used in front of a web application. This is especially true if using a higher paranoia level, i.e. paranoia level 2 and above.
There are some great guides and documentation available online which cover the tuning process. The CRS false positives and tuning documentation is very good. There is also a popular series of tutorials on netnea.com which cover every step from the very beginning: compiling the ModSecurity WAF engine, installing CRS, tuning by writing rule exclusions, and more.
We are going to use KeyCloak in one of our enterprise solutions. I would like to understand if KeyCloak is fully FIPS 140-2 compliant since we have compliance needs. There is very limited amount of information that I could find regarding this online. For example:-
http://lists.jboss.org/pipermail/keycloak-user/2015-October/003177.html
This is a pretty old link, so might not be updated with latest details.
If this is a wrong place to ask this question, kindly suggest the right one, if any. Thanks in advance!
After researching, It does appear that in the past year there is a FIPS validated cryptographic module that can be used in KeyCloak (called bouncy castle).
One of the issues is that there is no FIPS 140-2 compliant MFA option for Keycloak. It only supports Google authenticator and Free OTP apps).
Can anyone tell me the OPC-UA document in which I could find all the mandatory services provided by OPC-UA?
Thank You in Advance!
With Regards,
Avdoot Chalke
OPC UA Specification, Part 7: Profiles
https://opcfoundation.org/developer-tools/specifications-unified-architecture/part-7-profiles/
It might be not easy to figure out that reading specs.
There is online tool which is useful to figure out what is mandatory and what is optional for which profile: https://opcfoundation-onlineapplications.org/profilereporting/
Actually, I see that the page on the previous link has reference to this tool too (interactive profile viewer).
I've been confused on how to set up codeship.io with Bluehost, and wanted to know if there was any good documentation I should be looking over? I already looked at CodeShip's docs, and they weren't very helpful.
Thanks in advance.
I'm one of the founders of Codeship.
How are you currently deploying into Bluehost? Do you have ssh access or only ftp?
You can also either send me an email to flo#codeship.io or send us a support message through our in-app support.
I am using postgresql8.3 and include symmetris ds 1.5.1 in my application.But the replication is done fine for client to server . but the replication is not done from server to client.
I am newer to use the symmetric ds .Can anyone plese let me know the checklist of using symmetric ds for cheching that my symmetric ds is well configure or not.
Thank You very Much
Your description is very general, and it's not too easy to come up with any suggestions based on it. It could be that you have only set up one way replication, it could be that you have set up the root to both push and pull but not manually created a row for the client in NODE_SECURITY or it could be something different.
I suggest you first verify your configuration by looking at the SymmetricDS user guide. From there, i'd have a look at the log files (SymmetricDS usually gives some sort of sensible hint, although not always) and see if those say something. Last, I'd try out the SymmetricDS forum as you most likely will find more people there who are able to answer detailed technical questions.
Good luck!