![]() ![]() ![]() We'll use MariaDB for the example, but the instructions should also work for MySQL. This article shows you how to install and configure Red Hat's single sign-on technology to connect to a more mature database. ![]() So, it is highly recommended to replace this H2 database with a more production-ready external database. However, this H2 database is not viable in high-concurrency situations and should not be used in a cluster. Out of the box, single sign-on uses its own Java-based embedded relational database, called H2, to store persistent data. The goal of Red Hat's single sign-on technology is to make security simple, so that it is easy for application developers to secure the apps and services they have deployed in their organization. Red Hat's single sign-on (SSO) technology, based on the Keycloak open source project, is Red Hat's solution for securing web applications and RESTful web services. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |