[ Accueil ] [ CV / Curriculum Vitae ] [ Services ] [ Blog Technique ] [ Gotedo Platform ]
Technical Services/Tag Index

Infrastructure Security

ACTIVE FILTER:TAG IDENTIFIER(infrastructure-security)

Explorez les solutions techniques complètes et les services de conseil couvrant l’architecture système de bas niveau, le développement web et d’API haute performance, les applications natives IA, ainsi que les outils multiplateformes pour desktop et mobile.

  • Diagram illustrating Self-Hosted Authentication with Keycloak and Authentik for Enterprise Identity and Access Management

    Self-Hosted Authentication with Keycloak and Authentik for Enterprise Identity and Access Management

    Reclaim control over your user data and eliminate third-party pricing cliffs. I architect and deploy secure, self-hosted identity and access management (IAM) solutions using Keycloak or Authentik, providing enterprise-grade SSO and MFA without vendor lock-in.

    View Specifications >
  • Diagram illustrating Zero-Trust Identity and Access Management: Securing Private Services with Open-Source Technologies

    Zero-Trust Identity and Access Management: Securing Private Services with Open-Source Technologies

    Implement a robust Zero-Trust security layer for your internal infrastructure. I provide centralized identity management, Multi-Factor Authentication (2FA), and secure Single Sign-On (SSO) for all your private applications.

    View Specifications >
Contactez-MoiLinkedInGitHub