{"id":75123,"date":"2022-08-02T09:35:41","date_gmt":"2022-08-02T09:35:41","guid":{"rendered":"https:\/\/www.globallogic.com\/ua\/?post_type=events&amp;p=75123"},"modified":"2022-08-02T09:35:41","modified_gmt":"2022-08-02T09:35:41","slug":"java-webinar-15","status":"publish","type":"events","link":"https:\/\/www.globallogic.com\/ua\/about\/events\/java-webinar-15\/","title":{"rendered":"\u041c\u0430\u0442\u0435\u0440\u0456\u0430\u043b\u0438 GlobalLogic Java Webinar #15 &#8220;How to Secure Your Applications With a Keycloak?&#8221;"},"content":{"rendered":"<div class=\"classic_editor_content\"><strong>9 \u0441\u0435\u0440\u043f\u043d\u044f \u0432\u0456\u0434\u0431\u0443\u0432\u0441\u044f \u0432\u0435\u0431\u0456\u043d\u0430\u0440 \u0432\u0456\u0434 <span style=\"color: #ff6600\"><a style=\"color: #ff6600\" href=\"https:\/\/www.facebook.com\/groups\/GLJavaCommunity\" target=\"_blank\" rel=\"external nofollow\" target=\"_blank\">Java Community<\/a><\/span> \u201cHow to Secure Your Applications With a Keycloak?\u201d<\/strong><\/p>\n<p><span style=\"font-weight: 400\">\u041e\u0431\u0433\u043e\u0432\u043e\u0440\u0438\u043b\u0438 \u043c\u043e\u0436\u043b\u0438\u0432\u043e\u0441\u0442\u0456, \u043f\u0435\u0440\u0435\u0432\u0430\u0433\u0438 \u0442\u0430 \u043d\u0435\u0434\u043e\u043b\u0456\u043a\u0438 Keycloak, \u0441\u043a\u043b\u0430\u043b\u0438 \u0431\u0430\u0437\u043e\u0432\u0435 \u0440\u043e\u0437\u0443\u043c\u0456\u043d\u043d\u044f \u0442\u043e\u0433\u043e, \u044f\u043a \u0439\u043e\u0433\u043e \u043c\u043e\u0436\u043d\u0430 \u0437\u0430\u0441\u0442\u043e\u0441\u043e\u0432\u0443\u0432\u0430\u0442\u0438 \u0442\u0430 \u0456\u043d\u0442\u0435\u0433\u0440\u0443\u0432\u0430\u0442\u0438 \u0432 \u0440\u0456\u0437\u043d\u043e\u043c\u0430\u043d\u0456\u0442\u043d\u0456 \u0441\u0438\u0441\u0442\u0435\u043c\u0438.<\/span><\/p>\n<p><b>\u041f\u043e\u0433\u043e\u0432\u043e\u0440\u0438\u043b\u0438 \u043f\u0440\u043e \u0442\u0430\u043a\u0435:<\/b><\/p>\n<ul>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">\u041e\u0433\u043b\u044f\u0434 <\/span> <span style=\"font-weight: 400\">security \u043a\u043e\u043d\u0446\u0435\u043f\u0442\u0456\u0432;<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">\u0429\u043e \u0442\u0430\u043a\u0435 Keycloak?<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">\u0427\u043e\u043c\u0443 \u0432\u0430\u0440\u0442\u043e \u0432\u0438\u043a\u043e\u0440\u0438\u0441\u0442\u043e\u0432\u0443\u0432\u0430\u0442\u0438 Keycloak?<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">\u041e\u0441\u043d\u043e\u0432\u043d\u0456 \u043a\u043e\u043d\u0446\u0435\u043f\u0442\u0438 Keycloak;<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">\u041e\u0433\u043b\u044f\u0434 <\/span> <span style=\"font-weight: 400\">\u043e\u0441\u043d\u043e\u0432\u043d\u0438\u0445 \u0444\u0456\u0447 Keycloak;<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">\u0406\u043d\u0442\u0435\u0433\u0440\u0430\u0446\u0456\u044f \u0437 Keycloak.<\/span><\/li>\n<\/ul>\n<p><strong>\u041f\u0440\u043e\u043f\u043e\u043d\u0443\u0454\u043c\u043e \u0432\u0430\u043c \u043f\u0435\u0440\u0435\u0433\u043b\u044f\u043d\u0443\u0442\u0438 \u043c\u0430\u0442\u0435\u0440\u0456\u0430\u043b\u0438 \u0432\u0435\u0431\u0456\u043d\u0430\u0440\u0443:<\/strong><\/p>\n<p><span style=\"color: #ff6600\"><a style=\"color: #ff6600\" href=\"https:\/\/www.slideshare.net\/GlobalLogicUkraine\/how-to-secure-your-applications-with-a-keycloak\" target=\"_blank\" rel=\"external nofollow\" target=\"_blank\"><span style=\"font-weight: 400\">\u041f\u0440\u0435\u0437\u0435\u043d\u0442\u0430\u0446\u0456\u044f<\/span><\/a><\/span><\/p>\n<p><iframe loading=\"lazy\" title=\"GlobalLogic Java Webinar #15 \u201cHow to Secure Your Applications With a Keycloak?\u201d\" width=\"500\" height=\"281\" src=\"https:\/\/www.youtube.com\/embed\/pjIr1YI65Og?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe><\/p>\n<p>&nbsp;<\/p>\n<hr \/>\n<p><b>\u041f\u0440\u043e \u0441\u043f\u0456\u043a\u0435\u0440\u0430:<\/b><\/p>\n<p><span style=\"font-weight: 400\">\u0406\u0433\u043e\u0440 \u0414\u0456\u0434\u0438\u043a <\/span><span style=\"font-weight: 400\">\u2014<\/span><span style=\"font-weight: 400\"> Software Engineer, GlobalLogic \u0456\u0437 5-\u0440\u0456\u0447\u043d\u0438\u043c \u0434\u043e\u0441\u0432\u0456\u0434\u043e\u043c \u043a\u043e\u043c\u0435\u0440\u0446\u0456\u0439\u043d\u043e\u0457 \u0440\u043e\u0437\u0440\u043e\u0431\u043a\u0438 \u043d\u0430 Java. \u0411\u0440\u0430\u0432 \u0443\u0447\u0430\u0441\u0442\u044c \u0443 \u043f\u0440\u043e\u0454\u043a\u0442\u0430\u0445 healthcare, IOT \u0442\u0430 \u0456\u043d. \u0417\u0430\u0439\u043c\u0430\u0454\u0442\u044c\u0441\u044f \u0432\u0438\u043a\u043b\u0430\u0434\u0430\u043d\u043d\u044f\u043c Java \u0442\u0430 \u043c\u0435\u043d\u0442\u043e\u0440\u0441\u0442\u0432\u0456 \u043f\u043e\u0447\u0430\u0442\u043a\u0456\u0432\u0446\u0456\u0432.<\/span><\/p>\n<hr \/>\n<p>\u042f\u043a\u0449\u043e \u0432\u0438 Java-\u043f\u0440\u043e\u0444\u0435\u0441\u0456\u043e\u043d\u0430\u043b, \u0437\u0430\u0432\u0436\u0434\u0438 \u0448\u0443\u043a\u0430\u0454\u0442\u0435 \u043d\u043e\u0432\u0456 \u0442\u0443\u043b\u0438 \u0442\u0430 \u0441\u043f\u043e\u0441\u043e\u0431\u0438 \u0432\u0438\u043a\u043e\u0440\u0438\u0441\u0442\u0430\u043d\u043d\u044f \u0444\u0440\u0435\u0439\u043c\u0432\u043e\u0440\u043a\u0456\u0432 &#8211; \u043f\u0440\u043e\u043f\u043e\u043d\u0443\u0454\u043c\u043e \u0432\u0430\u043c \u043f\u0440\u0438\u0454\u0434\u043d\u0430\u0442\u0438\u0441\u044f \u0434\u043e \u043d\u0430\u0448\u043e\u0433\u043e Java Community:<\/p>\n<p style=\"text-align: center\"><a class=\"btn mod-orange\" href=\"https:\/\/www.facebook.com\/groups\/GLJavaCommunity\" target=\"_blank\" rel=\"external nofollow\" target=\"_blank\">\u041f\u0440\u0438\u0454\u0434\u043d\u0430\u0442\u0438\u0441\u044c \u0434\u043e \u043d\u0430\u0448\u043e\u0457 Java Community<\/a><\/p>\n<p style=\"text-align: center\"><a class=\"btn mod-orange\" href=\"https:\/\/www.globallogic.com\/ua\/career-search-page\/?keywords=java&amp;experience=&amp;locations=ukraine&amp;c=&amp;freelance=&amp;remote=\" target=\"_blank\" rel=\"noopener\">\u0412\u0456\u0434\u043a\u0440\u0438\u0442\u0456 Java-\u043f\u043e\u0437\u0438\u0446\u0456\u0457 \u0443 GlobalLogic<\/a><\/p>\n<p>&nbsp;<\/p>\n<hr \/>\n<p>\u041c\u0430\u0442\u0435\u0440\u0456\u0430\u043b\u0438 \u043f\u043e\u043f\u0435\u0440\u0435\u0434\u043d\u0456\u0445 \u0432\u0435\u0431\u0456\u043d\u0430\u0440\u0456\u0432 <span style=\"font-weight: 400\"><span style=\"color: #ff6600\"><a rel=\"external nofollow\" target=\"_blank\" href=\"https:\/\/www.facebook.com\/groups\/GLJavaCommunity\/\">Java Community<\/a><\/span><\/span>:<\/p>\n<p><a href=\"https:\/\/www.globallogic.com\/ua\/about\/events\/java-community-webinar-1\/\"><span style=\"color: #ff6600\">Java Community Webinar #1: \u201cPattern Matching in Java 14\u201d<\/span><\/a><\/p>\n<p><a href=\"https:\/\/www.globallogic.com\/ua\/about\/events\/java-community-webinar-2\/\"><span style=\"color: #ff6600\">Java Community Webinar #2: \u201cSpring Testing, Fight for the Context\u201d<\/span><\/a><\/p>\n<p><a href=\"https:\/\/www.globallogic.com\/ua\/about\/events\/java-community-webinar-3\/\"><span style=\"color: #ff6600\">Java Community Webinar #3: \u201cPatterns of Distributed Application Design\u201d<\/span><\/a><\/p>\n<p><a href=\"https:\/\/www.globallogic.com\/ua\/about\/events\/webinar-how-i-conduct-an-interview\/\"><span style=\"color: #ff6600\">How I Conduct an Interview<\/span><\/a><\/p>\n<p><a href=\"https:\/\/www.globallogic.com\/ua\/about\/events\/java-community-webinar-5\/\"><span style=\"color: #ff6600\">Java Community Webinar #5: \u201dHow I Configure Infrastructure of My Project\u201d<\/span><\/a><\/p>\n<p><a href=\"https:\/\/www.globallogic.com\/ua\/about\/events\/java-community-webinar-6\/\"><span style=\"color: #ff6600\">Java Community Webinar #6: \u201cProject Loom or How to Be Happy With Blocking Code\u201d<\/span><\/a><\/p>\n<p><a href=\"https:\/\/www.globallogic.com\/ua\/about\/events\/java-community-webinar-7\/\"><span style=\"color: #ff6600\">Java Community Webinar #7: \u201cIntroducing Hibernate Reactive \u2013 the First Reactive ORM Framework\u201d<br \/>\n<\/span><\/a><\/p>\n<p><a href=\"https:\/\/www.globallogic.com\/ua\/about\/events\/java-community-webinar-8\/\"><span style=\"color: #ff6600\">Java Community Webinar #8: \u201cHigh-Performance Systems Design\u201d<\/span><\/a><\/p>\n<p><a href=\"https:\/\/www.globallogic.com\/ua\/about\/events\/java-community-webinar-9\/\"><span style=\"color: #ff6600\">Java Community Webinar #9: \u201cRaspberry Pi Platform for Java Programmers\u201d<\/span><\/a><\/p>\n<p><a href=\"https:\/\/www.globallogic.com\/ua\/about\/events\/java-tecktalk-spring-boot-made-life-easier-with-kubernetes-and-microservices\/\"><span style=\"color: #ff6600\">Java TechTalk &#8220;Spring boot made life easier with Kubernetes and Microservices&#8221;<\/span><\/a><\/p>\n<p><a href=\"https:\/\/www.globallogic.com\/ua\/about\/events\/java-tecktalk-building-a-hypermedia-rest-application-using-spring\/\"><span style=\"color: #ff6600\">Java TechTalk &#8220;Building a Hypermedia REST application using Spring&#8221;<\/span><\/a><\/p>\n<p><a href=\"https:\/\/www.globallogic.com\/ua\/about\/events\/java-community-webinar-12\/\"><span style=\"color: #ff6600\">Java Community Webinar #12: &#8220;Java Versions and Features: Since JDK 8 to 16&#8221;<\/span><\/a><\/div>\n","protected":false},"excerpt":{"rendered":"<p>9 \u0441\u0435\u0440\u043f\u043d\u044f \u0432\u0456\u0434\u0431\u0443\u0432\u0441\u044f \u0432\u0435\u0431\u0456\u043d\u0430\u0440 \u0432\u0456\u0434 Java Community \u201cHow to Secure Your Applications With a Keycloak?\u201d \u041e\u0431\u0433\u043e\u0432\u043e\u0440\u0438\u043b\u0438 \u043c\u043e\u0436\u043b\u0438\u0432\u043e\u0441\u0442\u0456, \u043f\u0435\u0440\u0435\u0432\u0430\u0433\u0438 \u0442\u0430 \u043d\u0435\u0434\u043e\u043b\u0456\u043a\u0438 Keycloak, \u0441\u043a\u043b\u0430\u043b\u0438 \u0431\u0430\u0437\u043e\u0432\u0435 \u0440\u043e\u0437\u0443\u043c\u0456\u043d\u043d\u044f \u0442\u043e\u0433\u043e, \u044f\u043a \u0439\u043e\u0433\u043e \u043c\u043e\u0436\u043d\u0430 \u0437\u0430\u0441\u0442\u043e\u0441\u043e\u0432\u0443\u0432\u0430\u0442\u0438 \u0442\u0430 \u0456\u043d\u0442\u0435\u0433\u0440\u0443\u0432\u0430\u0442\u0438 \u0432 \u0440\u0456\u0437\u043d\u043e\u043c\u0430\u043d\u0456\u0442\u043d\u0456 \u0441\u0438\u0441\u0442\u0435\u043c\u0438. \u041f\u043e\u0433\u043e\u0432\u043e\u0440\u0438\u043b\u0438 \u043f\u0440\u043e \u0442\u0430\u043a\u0435: \u041e\u0433\u043b\u044f\u0434 security \u043a\u043e\u043d\u0446\u0435\u043f\u0442\u0456\u0432; \u0429\u043e \u0442\u0430\u043a\u0435 Keycloak? \u0427\u043e\u043c\u0443 \u0432\u0430\u0440\u0442\u043e \u0432\u0438\u043a\u043e\u0440\u0438\u0441\u0442\u043e\u0432\u0443\u0432\u0430\u0442\u0438 Keycloak? \u041e\u0441\u043d\u043e\u0432\u043d\u0456 \u043a\u043e\u043d\u0446\u0435\u043f\u0442\u0438 Keycloak; \u041e\u0433\u043b\u044f\u0434 \u043e\u0441\u043d\u043e\u0432\u043d\u0438\u0445 \u0444\u0456\u0447 Keycloak; \u0406\u043d\u0442\u0435\u0433\u0440\u0430\u0446\u0456\u044f \u0437 Keycloak. \u041f\u0440\u043e\u043f\u043e\u043d\u0443\u0454\u043c\u043e \u0432\u0430\u043c \u043f\u0435\u0440\u0435\u0433\u043b\u044f\u043d\u0443\u0442\u0438 \u043c\u0430\u0442\u0435\u0440\u0456\u0430\u043b\u0438 \u0432\u0435\u0431\u0456\u043d\u0430\u0440\u0443: \u041f\u0440\u0435\u0437\u0435\u043d\u0442\u0430\u0446\u0456\u044f &nbsp; \u041f\u0440\u043e \u0441\u043f\u0456\u043a\u0435\u0440\u0430: \u0406\u0433\u043e\u0440 \u0414\u0456\u0434\u0438\u043a \u2014 Software Engineer, GlobalLogic \u0456\u0437 5-\u0440\u0456\u0447\u043d\u0438\u043c \u0434\u043e\u0441\u0432\u0456\u0434\u043e\u043c \u043a\u043e\u043c\u0435\u0440\u0446\u0456\u0439\u043d\u043e\u0457 \u0440\u043e\u0437\u0440\u043e\u0431\u043a\u0438 \u043d\u0430 Java. \u0411\u0440\u0430\u0432 \u0443\u0447\u0430\u0441\u0442\u044c \u0443 \u043f\u0440\u043e\u0454\u043a\u0442\u0430\u0445 healthcare, IOT \u0442\u0430 \u0456\u043d. \u0417\u0430\u0439\u043c\u0430\u0454\u0442\u044c\u0441\u044f \u0432\u0438\u043a\u043b\u0430\u0434\u0430\u043d\u043d\u044f\u043c Java \u0442\u0430 \u043c\u0435\u043d\u0442\u043e\u0440\u0441\u0442\u0432\u0456 \u043f\u043e\u0447\u0430\u0442\u043a\u0456\u0432\u0446\u0456\u0432. \u042f\u043a\u0449\u043e \u0432\u0438 Java-\u043f\u0440\u043e\u0444\u0435\u0441\u0456\u043e\u043d\u0430\u043b, \u0437\u0430\u0432\u0436\u0434\u0438 \u0448\u0443\u043a\u0430\u0454\u0442\u0435 \u043d\u043e\u0432\u0456 \u0442\u0443\u043b\u0438 \u0442\u0430 \u0441\u043f\u043e\u0441\u043e\u0431\u0438 \u0432\u0438\u043a\u043e\u0440\u0438\u0441\u0442\u0430\u043d\u043d\u044f \u0444\u0440\u0435\u0439\u043c\u0432\u043e\u0440\u043a\u0456\u0432 &#8211; \u043f\u0440\u043e\u043f\u043e\u043d\u0443\u0454\u043c\u043e \u0432\u0430\u043c \u043f\u0440\u0438\u0454\u0434\u043d\u0430\u0442\u0438\u0441\u044f \u0434\u043e \u043d\u0430\u0448\u043e\u0433\u043e Java Community: \u041f\u0440\u0438\u0454\u0434\u043d\u0430\u0442\u0438\u0441\u044c \u0434\u043e \u043d\u0430\u0448\u043e\u0457 Java Community \u0412\u0456\u0434\u043a\u0440\u0438\u0442\u0456 Java-\u043f\u043e\u0437\u0438\u0446\u0456\u0457 \u0443 GlobalLogic &nbsp; \u041c\u0430\u0442\u0435\u0440\u0456\u0430\u043b\u0438 \u043f\u043e\u043f\u0435\u0440\u0435\u0434\u043d\u0456\u0445 \u0432\u0435\u0431\u0456\u043d\u0430\u0440\u0456\u0432 Java Community: Java Community Webinar #1: \u201cPattern Matching in Java 14\u201d Java Community Webinar #2: \u201cSpring Testing, Fight for the Context\u201d Java Community Webinar #3: \u201cPatterns of Distributed Application Design\u201d How I Conduct an Interview Java Community Webinar #5: \u201dHow I Configure Infrastructure of My Project\u201d Java Community Webinar #6: \u201cProject Loom or How to Be Happy With Blocking Code\u201d Java Community Webinar #7: \u201cIntroducing Hibernate Reactive \u2013 the First Reactive ORM Framework\u201d Java Community&#8230;<\/p>\n","protected":false},"featured_media":75124,"parent":0,"menu_order":0,"template":"","meta":{"_acf_changed":false,"footnotes":""},"embedded-category":[764,777],"class_list":["post-75123","events","type-events","status-publish","has-post-thumbnail","hentry","embedded-category-java","embedded-category-java-materials"],"acf":[],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.globallogic.com\/ua\/wp-json\/wp\/v2\/events\/75123","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.globallogic.com\/ua\/wp-json\/wp\/v2\/events"}],"about":[{"href":"https:\/\/www.globallogic.com\/ua\/wp-json\/wp\/v2\/types\/events"}],"version-history":[{"count":0,"href":"https:\/\/www.globallogic.com\/ua\/wp-json\/wp\/v2\/events\/75123\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.globallogic.com\/ua\/wp-json\/wp\/v2\/media\/75124"}],"wp:attachment":[{"href":"https:\/\/www.globallogic.com\/ua\/wp-json\/wp\/v2\/media?parent=75123"}],"wp:term":[{"taxonomy":"embedded-category","embeddable":true,"href":"https:\/\/www.globallogic.com\/ua\/wp-json\/wp\/v2\/embedded-category?post=75123"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}