Homepage
Open in app
Sign in
Get started
Follow the life of Nemo Technology through the eyes of its consultants
Follow
Using Keycloak and Kafka Stream to detect identity anomalies
Using Keycloak and Kafka Stream to detect identity anomalies
Lately, Fraud detection and prevention become a pertinent subject to numerous companies, and they put a lot of effort into it.
Youssef Bentaleb
Jan 17, 2022
Secure Authentication to Tekton Dashboard using OIDC
Secure Authentication to Tekton Dashboard using OIDC
Tekton is winning a lot of fame as a powerful CI/CD cloud native tool, using it in local projects can be fun and does not require any sort…
Otmane Guourch
Jan 12, 2022
QUpid — End-to-end data quality pipelines (Part2)
QUpid — End-to-end data quality pipelines (Part2)
In the first part, I talked about the different approaches we can opt for when doing data quality assurance. In this second part, I will…
Zakariae EL MESAOUDI
Jan 11, 2022
QUpid — End-to-end data quality pipelines (Part1)
QUpid — End-to-end data quality pipelines (Part1)
I — Introduction
Zakariae EL MESAOUDI
Jan 11, 2022
Let’s Publish Keycloak Events to Kafka using SPI (plugins)
Let’s Publish Keycloak Events to Kafka using SPI (plugins)
In this post, we will develop a plugin to stream Keycloak events to a Kafa topic using the Keycloak SPI’s. We will discuss the keycloak SPI…
Youssef Bentaleb
Jan 9, 2022
About Nemo Technology
Latest Stories
Archive
About Medium
Terms
Privacy
Teams