Bookmark this page

Summary

  • Configure Red Hat Single Sign-On clients for authentication and authorization, by using the Open ID Connect (OIDC) standard.

  • Choose the type of RH-SSO client, depending on the type of applications.

  • Describe SSO sessions, the different OIDC tokens, and how you can enhance the security managing them.

  • Create and manage role-based access control by using RH-SSO.

  • Enhance security by using the RH-SSO authentication options, the password policies, and the required actions.

Revision: do313-7.6-bc10333