SlideShare a Scribd company logo
Building an Effective Architecture for
Identity and Access Management
JorgeAlvarez
alvarez.jeap@gmail.com
GitHub: @jealvarez
Twitter: @edlask8
Disclaimer
The point of views, thoughts and opinions
expressed in this presentation belongs only to
the presenter and not necessarily to the
presenter’s employer, organization, committee
or other group or individual.
About Me
Agenda
• Challenges
• Keycloak Overview
• Why shouldI use Keycloak?
• CoreConcepts
• TechnologyStack
• Server Architecture
• Single Sign-on/ Single Logout
• Tokens
• Calling Backing Services
• Supported Platforms
• Demo
• Summary
• Bibliography
Challenges
Building an Effective Architecture for Identity and Access Management.pdf
The old way
• Securing monolithic web application
relatively easy
• Username and Password
• Credentials verified against table in
database
• HTTP Session stores in security
context
User Interface
Logic
Data
The new way
• Multiple applications
• Multiple variants of each application
• Multiple services
• Multiple logins
• Multiple databases
• Multiple devices
[AuthZ] [AuthN]
Building an Effective Architecture for Identity and Access Management.pdf
Building an Effective Architecture for Identity and Access Management.pdf
Building an Effective Architecture for Identity and Access Management.pdf
Are you lookingfor a single
sign-on solutionthatenables
you to secure newor legacy
applicationsandeasilyuse
federatedidentityproviders
such as socialnetworks?
You should look at
Keycloak
Keycloak
Overview
Building an Effective Architecture for Identity and Access Management.pdf
Project
• Java based AuthN and AuthZ server
• Started in 2013
• Current Version 11.0.3
• ~ Every 5 weeks
• Commercial Offering Available
• Red Hat SSO
• Have you logged into
developers.redhat.com or
www.openshift.com?
• Community
• 400+ Contributors
• Very robust, good documentation, many
examples
Why should I use
Keycloak?
Features (1/3)
• Support multiple database engines
Adaptability
• Social networking logins
• Federation
• LDAP
• Active Directory
• Adapters for different frameworks
• Spring
• NodeJS
• NetCore
• …
Integration
Features (2/3)
• Clustering
Scalability
• Keycloak Service Provider Interface
• Enables to implement your own authenticatoror federator
Extensibility
• Session management
• Force logouts
• Determine how many sessions your system currently has
Centralization
Features
Features (3/3)
Core Concepts
Core Concepts
Realm
Identity
Provider
User
Federation
Themes
Roles
Clients
User
Groups
Facebook
Google
…
OpenID
Connect
SAML
LDAP
Kerberos
Authentication
Client
Scopes
Sessions
Events
Active
Directory
Technology Stack
Technology Stack
Admin Console
❖ AngularJS
❖ React
❖ PatternFly
❖ Bootstrap
Keycloak Server
❖ WildFly
❖ JPA
❖ RestEasy
❖ Freemarker
❖ Arquillian
❖ Infinispan
Server
Architecture
Overview
Keycloak
2
Keycloak1
SSO Protocols
Protocol Mapper
Infinispan
Events
Social
Login
User Storage
JPA
User
Federation
Realm
Clients, Users, AuthN,
AuthZ, Policies, …
Account
Login
Identity
Brokering
Sessions
Realms
Settings
…
Replication
Infinispan
HTTP
Endpoint
Single Sign-on
How it works?
Single Sign-on
• Login only once to access all
applications
SSO
• OpenID Connect
• Build on top of OAuth2
Standardized Protocols
• Logouts can be propagated to
applications
Support for Single Logout
Tokens are associatedwith a session
Unauthenticated User
Unauthenticated user accesses to Application
1
Application redirectsto Keycloak
2
User submits credentials
2.1
Credentials
2.2
Keycloak creates SSO Session and
Emits Cookies
Generates Code and redirects the user back to
the Application
3
Application exchangesCode to Tokens
4
Application verifies receivedTokens
5
User is signed-in to the application
6
1
2.2
2.1
5
3
2
4
6
Generates Code
Keycloak detects SSO Session
9
Authenticated User
…
Authenticateduse accesses other application
7
Other application redirects user to Keycloak to
sign-in
8
Other application exchangescode for tokens
10
Other application verifies receivedtokens
11
7
11
9
8
10
12
Redirectsto other application
Tokens are associatedwith a session
User is signed-in to the other application
12
Keycloak creates logout request to another
application
3
Single Logout
User initiates logout
1
Application creates logoutrequest to Keycloak
2
Keycloak terminates session
4
2
4
1
Application returns response logout to
Keycloak
3.1
Applicationsdo logout
5
2.1
3.1
3
5
5
Keycloak returns response logout to the
application
2.1
Tokens
Overview
Essential Token Types
• Access Token
• Short lived [Minutes+]
• Used for accessingresources
• RefreshToken
• Long lived [Hours+]
• Used for requestingnew tokens
• ID Token
• Containsuser information(OIDC)
• Offline Token
• Long lived [Days+]
• Refreshtoken that never expires
Keycloak Tokens
• OAuth2 / OpenID Connect
• Signed self-contained JWT
• Claims
• Key-Value Pairs + User Information +
Metadata
• Issued by Keycloak
• Signed with Realm Private Key
• Verified with Realm
• Realm Public Key
• Limited lifespan
• Can be revoked
JSON Web Tokens
<header-base64>. <payload-base64>. <signature-base64>
Note
Base64 means Encoding
Encoding != Encryption
Calling Backend
Services
The backend looks up the Realm Public Key in
cache with the kid from the JWT
3
Calling Backend Services
Authenticateduse accesses to the application
1
Application uses the access token in the http
header to access to the backend
2
The backend verifies signature of the access
token with the Realm Public Key
4
2
4
1
The backend grants access and returns data
5
If not found, then fetch Public Key with
kid from Keycloak
3.1
Keycloak returnsRealm Public Key
3.2
The applicationcan displaythe data
6
Authorization:Bearer
eyJhbGciOiJSUzI1NiIsInR5cCIg…
5
3
3.1
3.2
6
kid
public key
access
token
data
User can access to the data
7
7
Supported
Platforms
Building an Effective Architecture for Identity and Access Management.pdf
Building an Effective Architecture for Identity and Access Management.pdf
Building an Effective Architecture for Identity and Access Management.pdf
RESTAPI
Bearer
Frontend
Confidential
Frontend
Public
Frontend
Confidential
Authorization:Bearer
eyJhbGciOiJSUzI1NiIsInR5cCIg…
Single Sign-on
System’s Architecture
Authorization:Bearer
eyJhbGcizI1NiIsInOiJSUR5cCIg…
Summary
Summary (1/2)
• Unzip and Run
• Docker Images
So easy to get started with
• Single Sign-on
• Single Logout
• Federation
• User Management
• Social Logins
• …
Provides many features out of the box
Summary (2/2)
Build on proven a robust standards
• OAuth 2.0
• OpenID Connect 1.0
• SAML2.0
Extensible
• Custom
• Authenticationmechanisms
• Event Listeners
• Themes
• …
Easy to integrate
• Adapters available for different frameworks
…
Bibliography
Useful links
Keycloak
Website
Keycloak
Community
Extensions
Keycloak
Docker Images
Keycloak
Quickstart
Projects
OpenID
Connect
SAML
JSON Web
Tokens
Email: alvarez.jeap@gmail.com
Github: @jealvarez
Twitter: @edlask8
Ad

More Related Content

Similar to Building an Effective Architecture for Identity and Access Management.pdf (20)

Keycloak for Science Gateways - SGCI Technology Sampler Webinar
Keycloak for Science Gateways - SGCI Technology Sampler WebinarKeycloak for Science Gateways - SGCI Technology Sampler Webinar
Keycloak for Science Gateways - SGCI Technology Sampler Webinar
marcuschristie
 
Self-Service x Hashicorp Vault
Self-Service x Hashicorp VaultSelf-Service x Hashicorp Vault
Self-Service x Hashicorp Vault
Martin Conraux
 
SSL Everywhere!
SSL Everywhere!SSL Everywhere!
SSL Everywhere!
Simon Haslam
 
TALK-I-TIVE_PresentatTALK-I-TIVE_Presentation[1][1].pptxion[1][1].pptx
TALK-I-TIVE_PresentatTALK-I-TIVE_Presentation[1][1].pptxion[1][1].pptxTALK-I-TIVE_PresentatTALK-I-TIVE_Presentation[1][1].pptxion[1][1].pptx
TALK-I-TIVE_PresentatTALK-I-TIVE_Presentation[1][1].pptxion[1][1].pptx
dosoro7306
 
TALK-I-TIVE_Presensadsdasdasdasdasdasdastation[1].pptx
TALK-I-TIVE_Presensadsdasdasdasdasdasdastation[1].pptxTALK-I-TIVE_Presensadsdasdasdasdasdasdastation[1].pptx
TALK-I-TIVE_Presensadsdasdasdasdasdasdastation[1].pptx
dosoro7306
 
Introduction to sitecore identity
Introduction to sitecore identityIntroduction to sitecore identity
Introduction to sitecore identity
Gopikrishna Gujjula
 
Adding Identity Management and Access Control to your App
Adding Identity Management and Access Control to your AppAdding Identity Management and Access Control to your App
Adding Identity Management and Access Control to your App
FIWARE
 
Managing your secrets in a cloud environment
Managing your secrets in a cloud environmentManaging your secrets in a cloud environment
Managing your secrets in a cloud environment
Taswar Bhatti
 
Part 5 of the REAL Webinars on Oracle Cloud Native Application Development - ...
Part 5 of the REAL Webinars on Oracle Cloud Native Application Development - ...Part 5 of the REAL Webinars on Oracle Cloud Native Application Development - ...
Part 5 of the REAL Webinars on Oracle Cloud Native Application Development - ...
Lucas Jellema
 
Web API 2 Token Based Authentication
Web API 2 Token Based AuthenticationWeb API 2 Token Based Authentication
Web API 2 Token Based Authentication
jeremysbrown
 
SharePoint Authentication And Authorization SPTechCon San Francisco
SharePoint Authentication And Authorization SPTechCon San FranciscoSharePoint Authentication And Authorization SPTechCon San Francisco
SharePoint Authentication And Authorization SPTechCon San Francisco
Liam Cleary [MVP]
 
Building IAM for OpenStack
Building IAM for OpenStackBuilding IAM for OpenStack
Building IAM for OpenStack
Steve Martinelli
 
Intro to Apache Shiro
Intro to Apache ShiroIntro to Apache Shiro
Intro to Apache Shiro
Claire Hunsaker
 
Adding identity management and access control to your app
Adding identity management and access control to your appAdding identity management and access control to your app
Adding identity management and access control to your app
Álvaro Alonso González
 
WebLogic authentication debugging
WebLogic authentication debuggingWebLogic authentication debugging
WebLogic authentication debugging
Maarten Smeets
 
Shifting security left simplifying security for k8s open shift environments
Shifting security left simplifying security for k8s open shift environmentsShifting security left simplifying security for k8s open shift environments
Shifting security left simplifying security for k8s open shift environments
LibbySchulze
 
Securing Microservices using Play and Akka HTTP
Securing Microservices using Play and Akka HTTPSecuring Microservices using Play and Akka HTTP
Securing Microservices using Play and Akka HTTP
Rafal Gancarz
 
Securing .NET Core, ASP.NET Core applications
Securing .NET Core, ASP.NET Core applicationsSecuring .NET Core, ASP.NET Core applications
Securing .NET Core, ASP.NET Core applications
NETUserGroupBern
 
FIWARE Training: Identity Management and Access Control
FIWARE Training: Identity Management and Access ControlFIWARE Training: Identity Management and Access Control
FIWARE Training: Identity Management and Access Control
FIWARE
 
Access Management for Cloud and Mobile
Access Management for Cloud and MobileAccess Management for Cloud and Mobile
Access Management for Cloud and Mobile
ForgeRock
 
Keycloak for Science Gateways - SGCI Technology Sampler Webinar
Keycloak for Science Gateways - SGCI Technology Sampler WebinarKeycloak for Science Gateways - SGCI Technology Sampler Webinar
Keycloak for Science Gateways - SGCI Technology Sampler Webinar
marcuschristie
 
Self-Service x Hashicorp Vault
Self-Service x Hashicorp VaultSelf-Service x Hashicorp Vault
Self-Service x Hashicorp Vault
Martin Conraux
 
TALK-I-TIVE_PresentatTALK-I-TIVE_Presentation[1][1].pptxion[1][1].pptx
TALK-I-TIVE_PresentatTALK-I-TIVE_Presentation[1][1].pptxion[1][1].pptxTALK-I-TIVE_PresentatTALK-I-TIVE_Presentation[1][1].pptxion[1][1].pptx
TALK-I-TIVE_PresentatTALK-I-TIVE_Presentation[1][1].pptxion[1][1].pptx
dosoro7306
 
TALK-I-TIVE_Presensadsdasdasdasdasdasdastation[1].pptx
TALK-I-TIVE_Presensadsdasdasdasdasdasdastation[1].pptxTALK-I-TIVE_Presensadsdasdasdasdasdasdastation[1].pptx
TALK-I-TIVE_Presensadsdasdasdasdasdasdastation[1].pptx
dosoro7306
 
Introduction to sitecore identity
Introduction to sitecore identityIntroduction to sitecore identity
Introduction to sitecore identity
Gopikrishna Gujjula
 
Adding Identity Management and Access Control to your App
Adding Identity Management and Access Control to your AppAdding Identity Management and Access Control to your App
Adding Identity Management and Access Control to your App
FIWARE
 
Managing your secrets in a cloud environment
Managing your secrets in a cloud environmentManaging your secrets in a cloud environment
Managing your secrets in a cloud environment
Taswar Bhatti
 
Part 5 of the REAL Webinars on Oracle Cloud Native Application Development - ...
Part 5 of the REAL Webinars on Oracle Cloud Native Application Development - ...Part 5 of the REAL Webinars on Oracle Cloud Native Application Development - ...
Part 5 of the REAL Webinars on Oracle Cloud Native Application Development - ...
Lucas Jellema
 
Web API 2 Token Based Authentication
Web API 2 Token Based AuthenticationWeb API 2 Token Based Authentication
Web API 2 Token Based Authentication
jeremysbrown
 
SharePoint Authentication And Authorization SPTechCon San Francisco
SharePoint Authentication And Authorization SPTechCon San FranciscoSharePoint Authentication And Authorization SPTechCon San Francisco
SharePoint Authentication And Authorization SPTechCon San Francisco
Liam Cleary [MVP]
 
Building IAM for OpenStack
Building IAM for OpenStackBuilding IAM for OpenStack
Building IAM for OpenStack
Steve Martinelli
 
Adding identity management and access control to your app
Adding identity management and access control to your appAdding identity management and access control to your app
Adding identity management and access control to your app
Álvaro Alonso González
 
WebLogic authentication debugging
WebLogic authentication debuggingWebLogic authentication debugging
WebLogic authentication debugging
Maarten Smeets
 
Shifting security left simplifying security for k8s open shift environments
Shifting security left simplifying security for k8s open shift environmentsShifting security left simplifying security for k8s open shift environments
Shifting security left simplifying security for k8s open shift environments
LibbySchulze
 
Securing Microservices using Play and Akka HTTP
Securing Microservices using Play and Akka HTTPSecuring Microservices using Play and Akka HTTP
Securing Microservices using Play and Akka HTTP
Rafal Gancarz
 
Securing .NET Core, ASP.NET Core applications
Securing .NET Core, ASP.NET Core applicationsSecuring .NET Core, ASP.NET Core applications
Securing .NET Core, ASP.NET Core applications
NETUserGroupBern
 
FIWARE Training: Identity Management and Access Control
FIWARE Training: Identity Management and Access ControlFIWARE Training: Identity Management and Access Control
FIWARE Training: Identity Management and Access Control
FIWARE
 
Access Management for Cloud and Mobile
Access Management for Cloud and MobileAccess Management for Cloud and Mobile
Access Management for Cloud and Mobile
ForgeRock
 

Recently uploaded (20)

Machine foundation notes for civil engineering students
Machine foundation notes for civil engineering studentsMachine foundation notes for civil engineering students
Machine foundation notes for civil engineering students
DYPCET
 
Smart City is the Future EN - 2024 Thailand Modify V1.0.pdf
Smart City is the Future EN - 2024 Thailand Modify V1.0.pdfSmart City is the Future EN - 2024 Thailand Modify V1.0.pdf
Smart City is the Future EN - 2024 Thailand Modify V1.0.pdf
PawachMetharattanara
 
Jacob Murphy Australia - Excels In Optimizing Software Applications
Jacob Murphy Australia - Excels In Optimizing Software ApplicationsJacob Murphy Australia - Excels In Optimizing Software Applications
Jacob Murphy Australia - Excels In Optimizing Software Applications
Jacob Murphy Australia
 
Little Known Ways To 3 Best sites to Buy Linkedin Accounts.pdf
Little Known Ways To 3 Best sites to Buy Linkedin Accounts.pdfLittle Known Ways To 3 Best sites to Buy Linkedin Accounts.pdf
Little Known Ways To 3 Best sites to Buy Linkedin Accounts.pdf
gori42199
 
ATAL 6 Days Online FDP Scheme Document 2025-26.pdf
ATAL 6 Days Online FDP Scheme Document 2025-26.pdfATAL 6 Days Online FDP Scheme Document 2025-26.pdf
ATAL 6 Days Online FDP Scheme Document 2025-26.pdf
ssuserda39791
 
Slide share PPT of SOx control technologies.pptx
Slide share PPT of SOx control technologies.pptxSlide share PPT of SOx control technologies.pptx
Slide share PPT of SOx control technologies.pptx
vvsasane
 
Applications of Centroid in Structural Engineering
Applications of Centroid in Structural EngineeringApplications of Centroid in Structural Engineering
Applications of Centroid in Structural Engineering
suvrojyotihalder2006
 
sss1.pptxsss1.pptxsss1.pptxsss1.pptxsss1.pptx
sss1.pptxsss1.pptxsss1.pptxsss1.pptxsss1.pptxsss1.pptxsss1.pptxsss1.pptxsss1.pptxsss1.pptx
sss1.pptxsss1.pptxsss1.pptxsss1.pptxsss1.pptx
ajayrm685
 
Control Methods of Noise Pollutions.pptx
Control Methods of Noise Pollutions.pptxControl Methods of Noise Pollutions.pptx
Control Methods of Noise Pollutions.pptx
vvsasane
 
Artificial intelligence and machine learning.pptx
Artificial intelligence and machine learning.pptxArtificial intelligence and machine learning.pptx
Artificial intelligence and machine learning.pptx
rakshanatarajan005
 
David Boutry - Specializes In AWS, Microservices And Python.pdf
David Boutry - Specializes In AWS, Microservices And Python.pdfDavid Boutry - Specializes In AWS, Microservices And Python.pdf
David Boutry - Specializes In AWS, Microservices And Python.pdf
David Boutry
 
6th International Conference on Big Data, Machine Learning and IoT (BMLI 2025)
6th International Conference on Big Data, Machine Learning and IoT (BMLI 2025)6th International Conference on Big Data, Machine Learning and IoT (BMLI 2025)
6th International Conference on Big Data, Machine Learning and IoT (BMLI 2025)
ijflsjournal087
 
Machine Learning basics POWERPOINT PRESENETATION
Machine Learning basics POWERPOINT PRESENETATIONMachine Learning basics POWERPOINT PRESENETATION
Machine Learning basics POWERPOINT PRESENETATION
DarrinBright1
 
seninarppt.pptx1bhjiikjhggghjykoirgjuyhhhjj
seninarppt.pptx1bhjiikjhggghjykoirgjuyhhhjjseninarppt.pptx1bhjiikjhggghjykoirgjuyhhhjj
seninarppt.pptx1bhjiikjhggghjykoirgjuyhhhjj
AjijahamadKhaji
 
ML_Unit_VI_DEEP LEARNING_Introduction to ANN.pdf
ML_Unit_VI_DEEP LEARNING_Introduction to ANN.pdfML_Unit_VI_DEEP LEARNING_Introduction to ANN.pdf
ML_Unit_VI_DEEP LEARNING_Introduction to ANN.pdf
rameshwarchintamani
 
Construction Materials (Paints) in Civil Engineering
Construction Materials (Paints) in Civil EngineeringConstruction Materials (Paints) in Civil Engineering
Construction Materials (Paints) in Civil Engineering
Lavish Kashyap
 
Working with USDOT UTCs: From Conception to Implementation
Working with USDOT UTCs: From Conception to ImplementationWorking with USDOT UTCs: From Conception to Implementation
Working with USDOT UTCs: From Conception to Implementation
Alabama Transportation Assistance Program
 
Modeling the Influence of Environmental Factors on Concrete Evaporation Rate
Modeling the Influence of Environmental Factors on Concrete Evaporation RateModeling the Influence of Environmental Factors on Concrete Evaporation Rate
Modeling the Influence of Environmental Factors on Concrete Evaporation Rate
Journal of Soft Computing in Civil Engineering
 
JRR Tolkien’s Lord of the Rings: Was It Influenced by Nordic Mythology, Homer...
JRR Tolkien’s Lord of the Rings: Was It Influenced by Nordic Mythology, Homer...JRR Tolkien’s Lord of the Rings: Was It Influenced by Nordic Mythology, Homer...
JRR Tolkien’s Lord of the Rings: Was It Influenced by Nordic Mythology, Homer...
Reflections on Morality, Philosophy, and History
 
Mode-Wise Corridor Level Travel-Time Estimation Using Machine Learning Models
Mode-Wise Corridor Level Travel-Time Estimation Using Machine Learning ModelsMode-Wise Corridor Level Travel-Time Estimation Using Machine Learning Models
Mode-Wise Corridor Level Travel-Time Estimation Using Machine Learning Models
Journal of Soft Computing in Civil Engineering
 
Machine foundation notes for civil engineering students
Machine foundation notes for civil engineering studentsMachine foundation notes for civil engineering students
Machine foundation notes for civil engineering students
DYPCET
 
Smart City is the Future EN - 2024 Thailand Modify V1.0.pdf
Smart City is the Future EN - 2024 Thailand Modify V1.0.pdfSmart City is the Future EN - 2024 Thailand Modify V1.0.pdf
Smart City is the Future EN - 2024 Thailand Modify V1.0.pdf
PawachMetharattanara
 
Jacob Murphy Australia - Excels In Optimizing Software Applications
Jacob Murphy Australia - Excels In Optimizing Software ApplicationsJacob Murphy Australia - Excels In Optimizing Software Applications
Jacob Murphy Australia - Excels In Optimizing Software Applications
Jacob Murphy Australia
 
Little Known Ways To 3 Best sites to Buy Linkedin Accounts.pdf
Little Known Ways To 3 Best sites to Buy Linkedin Accounts.pdfLittle Known Ways To 3 Best sites to Buy Linkedin Accounts.pdf
Little Known Ways To 3 Best sites to Buy Linkedin Accounts.pdf
gori42199
 
ATAL 6 Days Online FDP Scheme Document 2025-26.pdf
ATAL 6 Days Online FDP Scheme Document 2025-26.pdfATAL 6 Days Online FDP Scheme Document 2025-26.pdf
ATAL 6 Days Online FDP Scheme Document 2025-26.pdf
ssuserda39791
 
Slide share PPT of SOx control technologies.pptx
Slide share PPT of SOx control technologies.pptxSlide share PPT of SOx control technologies.pptx
Slide share PPT of SOx control technologies.pptx
vvsasane
 
Applications of Centroid in Structural Engineering
Applications of Centroid in Structural EngineeringApplications of Centroid in Structural Engineering
Applications of Centroid in Structural Engineering
suvrojyotihalder2006
 
sss1.pptxsss1.pptxsss1.pptxsss1.pptxsss1.pptx
sss1.pptxsss1.pptxsss1.pptxsss1.pptxsss1.pptxsss1.pptxsss1.pptxsss1.pptxsss1.pptxsss1.pptx
sss1.pptxsss1.pptxsss1.pptxsss1.pptxsss1.pptx
ajayrm685
 
Control Methods of Noise Pollutions.pptx
Control Methods of Noise Pollutions.pptxControl Methods of Noise Pollutions.pptx
Control Methods of Noise Pollutions.pptx
vvsasane
 
Artificial intelligence and machine learning.pptx
Artificial intelligence and machine learning.pptxArtificial intelligence and machine learning.pptx
Artificial intelligence and machine learning.pptx
rakshanatarajan005
 
David Boutry - Specializes In AWS, Microservices And Python.pdf
David Boutry - Specializes In AWS, Microservices And Python.pdfDavid Boutry - Specializes In AWS, Microservices And Python.pdf
David Boutry - Specializes In AWS, Microservices And Python.pdf
David Boutry
 
6th International Conference on Big Data, Machine Learning and IoT (BMLI 2025)
6th International Conference on Big Data, Machine Learning and IoT (BMLI 2025)6th International Conference on Big Data, Machine Learning and IoT (BMLI 2025)
6th International Conference on Big Data, Machine Learning and IoT (BMLI 2025)
ijflsjournal087
 
Machine Learning basics POWERPOINT PRESENETATION
Machine Learning basics POWERPOINT PRESENETATIONMachine Learning basics POWERPOINT PRESENETATION
Machine Learning basics POWERPOINT PRESENETATION
DarrinBright1
 
seninarppt.pptx1bhjiikjhggghjykoirgjuyhhhjj
seninarppt.pptx1bhjiikjhggghjykoirgjuyhhhjjseninarppt.pptx1bhjiikjhggghjykoirgjuyhhhjj
seninarppt.pptx1bhjiikjhggghjykoirgjuyhhhjj
AjijahamadKhaji
 
ML_Unit_VI_DEEP LEARNING_Introduction to ANN.pdf
ML_Unit_VI_DEEP LEARNING_Introduction to ANN.pdfML_Unit_VI_DEEP LEARNING_Introduction to ANN.pdf
ML_Unit_VI_DEEP LEARNING_Introduction to ANN.pdf
rameshwarchintamani
 
Construction Materials (Paints) in Civil Engineering
Construction Materials (Paints) in Civil EngineeringConstruction Materials (Paints) in Civil Engineering
Construction Materials (Paints) in Civil Engineering
Lavish Kashyap
 
Ad

Building an Effective Architecture for Identity and Access Management.pdf

  翻译: