Configure Red Hat Single Sign-On clients for authentication and authorization, by using the Open ID Connect (OIDC) standard.
Choose the type of RH-SSO client, depending on the type of applications.
Describe SSO sessions, the different OIDC tokens, and how you can enhance the security managing them.
Create and manage role-based access control by using RH-SSO.
Enhance security by using the RH-SSO authentication options, the password policies, and the required actions.