Gluu Webinars

Gluu Webinar: The OpenID Connect Client is NOT Always Right!

View the slides from this webinar and watch a recording on our website.

Want to schedule a similar webinar for your team? Just let us know!

Tuesday, June 13, 2017
11am Pacific / 1pm Central / 2pm Eastern

Join us for a free webinar to learn what to look for in secure OpenID Connect client implementations.

OpenID Connect can be used to achieve a range of security levels. Properly used, it can mitigate many risks associated with authenticating people online and sharing personally identifiable information (PII) across web and mobile applications.

However, OpenID Connect’s flexibility, combined with its shared ontogeny with OAuth 2.0, creates opportunities for error–developers may not use (or even know about!) certain security features necessary to achieve the transaction integrity they desire.

The good news is that client software and middleware services can do much of the heavy lifting.

So whether you’re a developer or security architect, register for this webinar to learn what you should look for in an application that acts as an OpenID Connect client.

Get started early with our recommended OpenID Connect reading:

About Gluu:

Gluu publishes identity and access management software that universities, government agencies and companies can use to securely identify people and manage what information they are allowed to access. Using Gluu’s products, an organization can centralize its authentication and authorization service and leverage standards such as OAuth 2.0, SAML and OpenID Connect to offer students, customers, employees, and partners single sign-on (SSO) and strong authentication.

Registration is now closed for this webinar.

Presenter: Mike Schwartz

Mike is the founder and CEO of Gluu, an access management software vendor serving companies, governments, and universities around the world.

An advocate of free open source software (FOSS), Mike has participated in the development of open standards like the User Managed Access (UMA) profile of OAuth 2.0, and currently leads the Open Trust Taxonomy for Federation Operators (OTTO) working group at the Kantara Initiative. Originally from New York, NY, Mike now resides with his family (and pigeons) in Austin, TX.