The document describes a session from the KubeCon EU 2023 conference on Keycloak, an open-source identity and access management solution. It provides an overview of the session which was presented by Alexander Schwartz from Red Hat and Yuuichi Nakamura from Hitachi and demonstrated how Keycloak can be used to securely authenticate users to applications like Grafana. It also discusses Keycloak's support for advanced security specifications like FAPI and efforts by the FAPI-SIG working group to promote features needed for compliance.
2022 APIsecure_Why Assertion-based Access Token is preferred to Handle-based ...APIsecure_ Official
APIsecure - April 6 & 7, 2022
APIsecure is the world’s first conference dedicated to API threat management; bringing together breakers, defenders, and solutions in API security.
Why Assertion-based Access Token is preferred to a Handle-based one?
Yoshiyuki Tabata, Software Engineer at Hitachi
This document discusses the differences between assertion-based access tokens and handle-based access tokens in OAuth 2.0. Assertion-based tokens are parsable tokens like JWTs that contain user and client information, while handle-based tokens are opaque references. Assertion-based tokens have advantages for performance and scalability but require cryptographic protection, while handle-based tokens require validation through the authorization server. The document then examines scenarios where handle-based tokens could cause problems, such as with multiple authorization servers, and outlines secure validation steps for assertion-based tokens.
This document provides an overview and summary of a presentation about authentication and authorization for cloud native applications using Keycloak. The presentation introduces Keycloak as an open source identity and access management solution, discusses the importance of authentication and authorization, and describes how Keycloak can be used for authentication methods like single sign-on, social login, and multi-factor authentication as well as authorization standards like OAuth 2.0 and Financial-Grade API 1.0. It also covers Keycloak features that help secure cloud native environments and applications.
This document discusses implementing a lightweight zero-trust network using the open source tools Keycloak and NGINX. It begins by explaining the transition from a traditional network security model with clear boundaries between public and private networks to a zero-trust model where security boundaries are defined individually for each service or pod. It then covers how to implement the underlying technologies of JWT validation, mutual TLS authentication, and OAuth MTLS using Keycloak as an authorization server and NGINX as an API gateway. Additional topics discussed include how to secure east-west internal traffic and resolve potential policy decision point chokepoints.
Implementing WebAuthn & FAPI supports on KeycloakYuichi Nakamura
Keycloak supports WebAuthn and FAPI by implementing their features and passing conformance tests. Hitachi contributed WebAuthn support and worked with NRI to add FAPI compliance, addressing issues like supporting newer signature algorithms and the PKCE protocol. Further contributions are welcomed to resolve remaining FAPI test issues.
The document discusses the challenge of implementing scalable authorization and describes how to use Keycloak's authorization service to achieve it. Keycloak allows defining fine-grained authorization policies and centralizing authorization data, improving scalability. Combined with OPA and CockroachDB, Keycloak can also enhance performance and availability while maintaining a centralized approach. The document provides an overview of Keycloak's authorization capabilities and how they enable scalable and standards-based authorization.
1) The document discusses various methods for securing RESTful APIs, including choosing the right security protocol, understanding authentication vs authorization, and exploring specific protocols like basic authentication, JSON web tokens, OAuth1.0a, and OAuth2.
2) It provides details on each protocol, including how they work, benefits, structures like the JWT header and payload, and code examples for implementation flows.
3) The key takeaways are to never use basic authentication without TLS, favor HMAC algorithms over bearer tokens, and use OAuth1.0a or OAuth2 (preferably MAC) for authentication, as OAuth is an authorization protocol rather than authentication standard.
OAuth2 for IoT Security: Why OpenID Connect & UMA Are They KeyMike Schwartz
This document discusses OAuth2 profiles like OpenID Connect and UMA and why they should be adopted for IoT. OpenID Connect provides identity while UMA provides access control. Both standards have been in development for 10 years based on prior experience. They are a perfect fit for IoT use cases as they standardize interfaces without assuming cloud, are proven usable by developers, are small, scale well, and have industry consensus with Google and Microsoft supporting OpenID Connect. UMA 1.0 will be announced in April 2015.
Enable Oauth2.0 with Sentinet API Management (Massimo Crippa @ BTUG Event)Codit
Find here the slides of the presentation on Sentinet, given by Massimo Crippa (Codit) on the BTUG Event of 13th of October 2015.
Sentinet has recently introduced the support for the OAuth and OpenID Connect protocols.
In this presentation you will see the supported authentication flows, how to secure a regular BizTalk SOAP and REST service with OAuth 2.0 and how to call an OAuth-protected API from BizTalk with no coding or any changes in the existing application.
IRJET- Proof of Document using Multichain and EthereumIRJET Journal
This document proposes a proof of document system using Multichain and Ethereum blockchain technologies. It involves developing a frontend using HTML, CSS, JavaScript, and frameworks like Bootstrap and jQuery. Documents are uploaded and a unique hash is generated using SHA-256. The hash is stored on a private Multichain blockchain to prove the document's existence. An API is created using PHP frameworks like Slim to allow interaction with the blockchain. The system aims to provide a secure and verifiable way to prove ownership and existence of digital documents and records. Potential applications mentioned include securing medical, academic, and business records and agreements.
Find out how today’s authorization experts are getting maximum value from OAuth
OAuth has quickly become the key standard for authorization across mobile apps and the Web. But are you getting the most out of OAuth? Join Mehdi Medjaoul, Co-Founder & Executive Director of Webshell – the company behind OAuth.io – and Scott Morrison, former CTO of Layer 7 and now Distinguished Engineer at CA Technologies, as they discuss how authorization experts are really using OAuth today.
EduID Mobile App - Use-Cases, Concepts and ImplementationChristian Glahn
This presentation describes the token-agent implementation for openID Connect for authenticating native mobile apps provided by third parties. It presents a standards-based working solution for integrating loosely coupled native apps into a trust federation using. This allows for deeper integrated authentication services on Android and iOS without violating app-store policies.
This presentation has been part of the EduID Mobile App workshop at SWITCH on 25 Apr. 2017.
Thanks to Christoph Graf (SWITCH), Riccardo Mazza (USI), Michael Hausherr (FHNW), Goran Josic (USI), and Yann Cuttaz (USI).
The document discusses Keycloak and its capabilities for satisfying the Financial-grade API (FAPI) security profile. It introduces Keycloak and describes how the proposed "Client Policy" feature allows Keycloak to easily meet the FAPI requirements by applying security profiles to client applications based on configurable conditions and executors. It also outlines other efforts like the FAPI-SIG group and implementation of FAPI requirements in the 3scale API gateway to help build fully FAPI-compliant systems.
The document summarizes the Open Authentication initiative (OATH), which aims to drive adoption of open strong authentication standards. OATH has created standardized authentication algorithms like HOTP and works with members to promote interoperability. Its reference architecture provides guidance for integrating strong authentication into applications while balancing security, usability and choice. OATH also works on credential provisioning standards and certification programs to further authentication adoption.
The document provides an overview of Agile, DevOps and Cloud Management from a security, risk management and audit compliance perspective. It discusses how the IT industry paradigm is shifting towards microservices, containers, continuous delivery and cloud platforms. DevOps is described as development and operations engineers participating together in the entire service lifecycle. Key differences in DevOps include changes to configuration management, release and change management, and event monitoring. Factors for DevOps success include culture, collaboration, eliminating waste, unified processes, tooling and automation.
apidays LIVE LONDON - Toward certifying Financial-grade API profile with Keyc...apidays
apidays LIVE LONDON - The Road to Embedded Finance, Banking and Insurance with APIs
Toward certifying Financial-grade API profile with Keycloak
Yoshiyuki Tabata, Software Engineer at Hitachi, Ltd.
Oracle API Platform Cloud Service Best Practices & Lessons Learntluisw19
The document provides best practices and lessons learned from implementing Oracle API Platform. It discusses the importance of API management and outlines the key steps in the API lifecycle. It also summarizes the steps recommended for a successful API Platform implementation, including discovery workshops, architecture design, installation tips, and an API design process leveraging API-first principles.
The document describes Oracle Blockchain Platform (OBP), which provides a fully-managed blockchain as a service. OBP uses Hyperledger Fabric as its underlying blockchain framework and handles all administration and management tasks automatically. It allows developers to build and deploy smart contracts through a console and SDKs to automate business processes on the blockchain network. OBP also offers tools to integrate blockchain applications with Oracle and third-party applications.
Getting Started with API Management – Why It's Needed On-prem and in the CloudRevelation Technologies
APIs are one of the main elements of cloud services. All major cloud service providers expose REST APIs to allow you to programmatically access their services and capabilities. SOAP and REST are the two most common ways of exposing APIs, whether to external, partner, cloud, or internal developers.
The concept of API management is to publish these web APIs for consumption, and includes capabilities such as monitoring, security, and documentation.
This presentation introduces basic concepts of APIs, API management, cloud REST services, and a brief walkthrough of WSO2 API Manager and Oracle API Gateway to see how you can centrally publish, expose, and secure APIs, essentially virtualizing your backend services.
This work is part of the open source testbed setup for Cloud interoperability & portability. Cloud Security Workgroup will further review and generate complete working set as we move along. This is part I of the effort.
This document provides an overview of APIs, API management, integration, and API security. It discusses why organizations adopt APIs to accelerate mobile app development, foster reuse, and allow external developers to innovate. The document outlines components of API management like the API gateway and developer portal. It also discusses how SOA, ESB, and APIs can converge in the API facade pattern to provide simple interfaces to complex systems. The presentation demonstrates this pattern using WSO2 API Manager and ESB and discusses API security techniques like OAuth for identity delegation.
Free and open cloud security posture monitoringElasticsearch
As organizations migrate to the cloud, attackers have diversified to operate in cloud environments. Learn about the challenges faced by security teams in the cloud and why attacks against cloud environments often succeed. We’ll demonstrate how to ship event data from platforms like AWS, Okta, and Azure to the Elastic Stack, and how security teams can monitor attacker behavior using Elastic Security and Elastic’s free and open detection rules.
The wait is over! ForgeRock is releasing shiny new versions of all solution areas of the ForgeRock Identity Platform. To give you a preview on what’s coming, join this webinar to hear directly from the Product Managers what’s new in:
Access Management
Identity Management
Directory Services
Identity Gateway
Shared Services
Learn more about ForgeRock Access Management:
https://www.forgerock.com/platform/access-management/
Learn more about ForgeRock Identity Management:
https://www.forgerock.com/platform/identity-management/
1) The document discusses various methods for securing RESTful APIs, including choosing the right security protocol, understanding authentication vs authorization, and exploring specific protocols like basic authentication, JSON web tokens, OAuth1.0a, and OAuth2.
2) It provides details on each protocol, including how they work, benefits, structures like the JWT header and payload, and code examples for implementation flows.
3) The key takeaways are to never use basic authentication without TLS, favor HMAC algorithms over bearer tokens, and use OAuth1.0a or OAuth2 (preferably MAC) for authentication, as OAuth is an authorization protocol rather than authentication standard.
OAuth2 for IoT Security: Why OpenID Connect & UMA Are They KeyMike Schwartz
This document discusses OAuth2 profiles like OpenID Connect and UMA and why they should be adopted for IoT. OpenID Connect provides identity while UMA provides access control. Both standards have been in development for 10 years based on prior experience. They are a perfect fit for IoT use cases as they standardize interfaces without assuming cloud, are proven usable by developers, are small, scale well, and have industry consensus with Google and Microsoft supporting OpenID Connect. UMA 1.0 will be announced in April 2015.
Enable Oauth2.0 with Sentinet API Management (Massimo Crippa @ BTUG Event)Codit
Find here the slides of the presentation on Sentinet, given by Massimo Crippa (Codit) on the BTUG Event of 13th of October 2015.
Sentinet has recently introduced the support for the OAuth and OpenID Connect protocols.
In this presentation you will see the supported authentication flows, how to secure a regular BizTalk SOAP and REST service with OAuth 2.0 and how to call an OAuth-protected API from BizTalk with no coding or any changes in the existing application.
IRJET- Proof of Document using Multichain and EthereumIRJET Journal
This document proposes a proof of document system using Multichain and Ethereum blockchain technologies. It involves developing a frontend using HTML, CSS, JavaScript, and frameworks like Bootstrap and jQuery. Documents are uploaded and a unique hash is generated using SHA-256. The hash is stored on a private Multichain blockchain to prove the document's existence. An API is created using PHP frameworks like Slim to allow interaction with the blockchain. The system aims to provide a secure and verifiable way to prove ownership and existence of digital documents and records. Potential applications mentioned include securing medical, academic, and business records and agreements.
Find out how today’s authorization experts are getting maximum value from OAuth
OAuth has quickly become the key standard for authorization across mobile apps and the Web. But are you getting the most out of OAuth? Join Mehdi Medjaoul, Co-Founder & Executive Director of Webshell – the company behind OAuth.io – and Scott Morrison, former CTO of Layer 7 and now Distinguished Engineer at CA Technologies, as they discuss how authorization experts are really using OAuth today.
EduID Mobile App - Use-Cases, Concepts and ImplementationChristian Glahn
This presentation describes the token-agent implementation for openID Connect for authenticating native mobile apps provided by third parties. It presents a standards-based working solution for integrating loosely coupled native apps into a trust federation using. This allows for deeper integrated authentication services on Android and iOS without violating app-store policies.
This presentation has been part of the EduID Mobile App workshop at SWITCH on 25 Apr. 2017.
Thanks to Christoph Graf (SWITCH), Riccardo Mazza (USI), Michael Hausherr (FHNW), Goran Josic (USI), and Yann Cuttaz (USI).
The document discusses Keycloak and its capabilities for satisfying the Financial-grade API (FAPI) security profile. It introduces Keycloak and describes how the proposed "Client Policy" feature allows Keycloak to easily meet the FAPI requirements by applying security profiles to client applications based on configurable conditions and executors. It also outlines other efforts like the FAPI-SIG group and implementation of FAPI requirements in the 3scale API gateway to help build fully FAPI-compliant systems.
The document summarizes the Open Authentication initiative (OATH), which aims to drive adoption of open strong authentication standards. OATH has created standardized authentication algorithms like HOTP and works with members to promote interoperability. Its reference architecture provides guidance for integrating strong authentication into applications while balancing security, usability and choice. OATH also works on credential provisioning standards and certification programs to further authentication adoption.
The document provides an overview of Agile, DevOps and Cloud Management from a security, risk management and audit compliance perspective. It discusses how the IT industry paradigm is shifting towards microservices, containers, continuous delivery and cloud platforms. DevOps is described as development and operations engineers participating together in the entire service lifecycle. Key differences in DevOps include changes to configuration management, release and change management, and event monitoring. Factors for DevOps success include culture, collaboration, eliminating waste, unified processes, tooling and automation.
apidays LIVE LONDON - Toward certifying Financial-grade API profile with Keyc...apidays
apidays LIVE LONDON - The Road to Embedded Finance, Banking and Insurance with APIs
Toward certifying Financial-grade API profile with Keycloak
Yoshiyuki Tabata, Software Engineer at Hitachi, Ltd.
Oracle API Platform Cloud Service Best Practices & Lessons Learntluisw19
The document provides best practices and lessons learned from implementing Oracle API Platform. It discusses the importance of API management and outlines the key steps in the API lifecycle. It also summarizes the steps recommended for a successful API Platform implementation, including discovery workshops, architecture design, installation tips, and an API design process leveraging API-first principles.
The document describes Oracle Blockchain Platform (OBP), which provides a fully-managed blockchain as a service. OBP uses Hyperledger Fabric as its underlying blockchain framework and handles all administration and management tasks automatically. It allows developers to build and deploy smart contracts through a console and SDKs to automate business processes on the blockchain network. OBP also offers tools to integrate blockchain applications with Oracle and third-party applications.
Getting Started with API Management – Why It's Needed On-prem and in the CloudRevelation Technologies
APIs are one of the main elements of cloud services. All major cloud service providers expose REST APIs to allow you to programmatically access their services and capabilities. SOAP and REST are the two most common ways of exposing APIs, whether to external, partner, cloud, or internal developers.
The concept of API management is to publish these web APIs for consumption, and includes capabilities such as monitoring, security, and documentation.
This presentation introduces basic concepts of APIs, API management, cloud REST services, and a brief walkthrough of WSO2 API Manager and Oracle API Gateway to see how you can centrally publish, expose, and secure APIs, essentially virtualizing your backend services.
This work is part of the open source testbed setup for Cloud interoperability & portability. Cloud Security Workgroup will further review and generate complete working set as we move along. This is part I of the effort.
This document provides an overview of APIs, API management, integration, and API security. It discusses why organizations adopt APIs to accelerate mobile app development, foster reuse, and allow external developers to innovate. The document outlines components of API management like the API gateway and developer portal. It also discusses how SOA, ESB, and APIs can converge in the API facade pattern to provide simple interfaces to complex systems. The presentation demonstrates this pattern using WSO2 API Manager and ESB and discusses API security techniques like OAuth for identity delegation.
Free and open cloud security posture monitoringElasticsearch
As organizations migrate to the cloud, attackers have diversified to operate in cloud environments. Learn about the challenges faced by security teams in the cloud and why attacks against cloud environments often succeed. We’ll demonstrate how to ship event data from platforms like AWS, Okta, and Azure to the Elastic Stack, and how security teams can monitor attacker behavior using Elastic Security and Elastic’s free and open detection rules.
The wait is over! ForgeRock is releasing shiny new versions of all solution areas of the ForgeRock Identity Platform. To give you a preview on what’s coming, join this webinar to hear directly from the Product Managers what’s new in:
Access Management
Identity Management
Directory Services
Identity Gateway
Shared Services
Learn more about ForgeRock Access Management:
https://www.forgerock.com/platform/access-management/
Learn more about ForgeRock Identity Management:
https://www.forgerock.com/platform/identity-management/
This document discusses security considerations for API gateway aggregation. It proposes building an API gateway aggregator in front of existing API gateways to expose APIs outside a company while minimizing security risks and impact on existing services. It describes how the aggregator can implement OAuth 2.0 authorization with a centralized authorization server and token exchange to authorize external applications without complexifying authorization for internal services. Advanced use cases discussed include supporting the Financial-grade API security profile for highly sensitive data and implementing zero-trust networking.
Yoshiyuki Tabata from Hitachi presented on API specifications and tools that help engineers construct high-security API systems. He discussed standards like OAuth 2.0, OIDC, PKCE, and OAuth MTLS. Useful features for testing include decoding tokens to check validity, and calling authorization server endpoints to validate access control. Implementing these features in mock servers and clients allows engineers to efficiently test if high-security requirements are met before production.
The document discusses implementing security and availability requirements for a banking API system using open source software. It describes using the 3scale API management platform and Keycloak identity management software together to meet authentication, authorization, access control, availability, and standards compliance requirements. Patches were submitted to these open source projects to enhance their features and better support the banking use case.
This document discusses identity provider mix-up attacks in OAuth and describes several patterns of these attacks. It also outlines various mitigations and which mitigations are effective against each attack pattern. Specifically, it covers attack patterns that occur before and after the authorization code is obtained, listing three patterns for the former and two for the latter. Finally, it analyzes how the mitigation of using distinct redirect URIs matches up against each combination of attack patterns.
AI and Data Privacy in 2025: Global TrendsInData Labs
In this infographic, we explore how businesses can implement effective governance frameworks to address AI data privacy. Understanding it is crucial for developing effective strategies that ensure compliance, safeguard customer trust, and leverage AI responsibly. Equip yourself with insights that can drive informed decision-making and position your organization for success in the future of data privacy.
This infographic contains:
-AI and data privacy: Key findings
-Statistics on AI data privacy in the today’s world
-Tips on how to overcome data privacy challenges
-Benefits of AI data security investments.
Keep up-to-date on how AI is reshaping privacy standards and what this entails for both individuals and organizations.
Andrew Marnell: Transforming Business Strategy Through Data-Driven InsightsAndrew Marnell
With expertise in data architecture, performance tracking, and revenue forecasting, Andrew Marnell plays a vital role in aligning business strategies with data insights. Andrew Marnell’s ability to lead cross-functional teams ensures businesses achieve sustainable growth and operational excellence.
Book industry standards are evolving rapidly. In the first part of this session, we’ll share an overview of key developments from 2024 and the early months of 2025. Then, BookNet’s resident standards expert, Tom Richardson, and CEO, Lauren Stewart, have a forward-looking conversation about what’s next.
Link to recording, presentation slides, and accompanying resource: https://bnctechforum.ca/sessions/standardsgoals-for-2025-standards-certification-roundup/
Presented by BookNet Canada on May 6, 2025 with support from the Department of Canadian Heritage.
Artificial Intelligence is providing benefits in many areas of work within the heritage sector, from image analysis, to ideas generation, and new research tools. However, it is more critical than ever for people, with analogue intelligence, to ensure the integrity and ethical use of AI. Including real people can improve the use of AI by identifying potential biases, cross-checking results, refining workflows, and providing contextual relevance to AI-driven results.
News about the impact of AI often paints a rosy picture. In practice, there are many potential pitfalls. This presentation discusses these issues and looks at the role of analogue intelligence and analogue interfaces in providing the best results to our audiences. How do we deal with factually incorrect results? How do we get content generated that better reflects the diversity of our communities? What roles are there for physical, in-person experiences in the digital world?
Spark is a powerhouse for large datasets, but when it comes to smaller data workloads, its overhead can sometimes slow things down. What if you could achieve high performance and efficiency without the need for Spark?
At S&P Global Commodity Insights, having a complete view of global energy and commodities markets enables customers to make data-driven decisions with confidence and create long-term, sustainable value. 🌍
Explore delta-rs + CDC and how these open-source innovations power lightweight, high-performance data applications beyond Spark! 🚀
Designing Low-Latency Systems with Rust and ScyllaDB: An Architectural Deep DiveScyllaDB
Want to learn practical tips for designing systems that can scale efficiently without compromising speed?
Join us for a workshop where we’ll address these challenges head-on and explore how to architect low-latency systems using Rust. During this free interactive workshop oriented for developers, engineers, and architects, we’ll cover how Rust’s unique language features and the Tokio async runtime enable high-performance application development.
As you explore key principles of designing low-latency systems with Rust, you will learn how to:
- Create and compile a real-world app with Rust
- Connect the application to ScyllaDB (NoSQL data store)
- Negotiate tradeoffs related to data modeling and querying
- Manage and monitor the database for consistently low latencies
UiPath Community Berlin: Orchestrator API, Swagger, and Test Manager APIUiPathCommunity
Join this UiPath Community Berlin meetup to explore the Orchestrator API, Swagger interface, and the Test Manager API. Learn how to leverage these tools to streamline automation, enhance testing, and integrate more efficiently with UiPath. Perfect for developers, testers, and automation enthusiasts!
📕 Agenda
Welcome & Introductions
Orchestrator API Overview
Exploring the Swagger Interface
Test Manager API Highlights
Streamlining Automation & Testing with APIs (Demo)
Q&A and Open Discussion
Perfect for developers, testers, and automation enthusiasts!
👉 Join our UiPath Community Berlin chapter: https://community.uipath.com/berlin/
This session streamed live on April 29, 2025, 18:00 CET.
Check out all our upcoming UiPath Community sessions at https://community.uipath.com/events/.
Social Media App Development Company-EmizenTechSteve Jonas
EmizenTech is a trusted Social Media App Development Company with 11+ years of experience in building engaging and feature-rich social platforms. Our team of skilled developers delivers custom social media apps tailored to your business goals and user expectations. We integrate real-time chat, video sharing, content feeds, notifications, and robust security features to ensure seamless user experiences. Whether you're creating a new platform or enhancing an existing one, we offer scalable solutions that support high performance and future growth. EmizenTech empowers businesses to connect users globally, boost engagement, and stay competitive in the digital social landscape.
Massive Power Outage Hits Spain, Portugal, and France: Causes, Impact, and On...Aqusag Technologies
In late April 2025, a significant portion of Europe, particularly Spain, Portugal, and parts of southern France, experienced widespread, rolling power outages that continue to affect millions of residents, businesses, and infrastructure systems.
This is the keynote of the Into the Box conference, highlighting the release of the BoxLang JVM language, its key enhancements, and its vision for the future.
Increasing Retail Store Efficiency How can Planograms Save Time and Money.pptxAnoop Ashok
In today's fast-paced retail environment, efficiency is key. Every minute counts, and every penny matters. One tool that can significantly boost your store's efficiency is a well-executed planogram. These visual merchandising blueprints not only enhance store layouts but also save time and money in the process.
HCL Nomad Web – Best Practices and Managing Multiuser Environmentspanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-nomad-web-best-practices-and-managing-multiuser-environments/
HCL Nomad Web is heralded as the next generation of the HCL Notes client, offering numerous advantages such as eliminating the need for packaging, distribution, and installation. Nomad Web client upgrades will be installed “automatically” in the background. This significantly reduces the administrative footprint compared to traditional HCL Notes clients. However, troubleshooting issues in Nomad Web present unique challenges compared to the Notes client.
Join Christoph and Marc as they demonstrate how to simplify the troubleshooting process in HCL Nomad Web, ensuring a smoother and more efficient user experience.
In this webinar, we will explore effective strategies for diagnosing and resolving common problems in HCL Nomad Web, including
- Accessing the console
- Locating and interpreting log files
- Accessing the data folder within the browser’s cache (using OPFS)
- Understand the difference between single- and multi-user scenarios
- Utilizing Client Clocking
Noah Loul Shares 5 Steps to Implement AI Agents for Maximum Business Efficien...Noah Loul
Artificial intelligence is changing how businesses operate. Companies are using AI agents to automate tasks, reduce time spent on repetitive work, and focus more on high-value activities. Noah Loul, an AI strategist and entrepreneur, has helped dozens of companies streamline their operations using smart automation. He believes AI agents aren't just tools—they're workers that take on repeatable tasks so your human team can focus on what matters. If you want to reduce time waste and increase output, AI agents are the next move.