DevOps Coach
DevOps Coach
Mar 7, 2026 · Cloud Native

Argo CD 3.3 Unveiled: PreDelete Hooks, Source Hydrator & Production‑Ready Enhancements

Argo CD 3.3 introduces a suite of production‑ready features—including native PreDelete hooks for safe resource cleanup, an enhanced Source Hydrator with Git notes and inline parameters, automatic OIDC token refresh, shallow Git cloning for large repos, and built‑in KEDA autoscaling—plus detailed upgrade guidance and best‑practice recommendations.

Argo CDCI/CDGitOps
0 likes · 26 min read
Argo CD 3.3 Unveiled: PreDelete Hooks, Source Hydrator & Production‑Ready Enhancements
Linux Ops Smart Journey
Linux Ops Smart Journey
Oct 28, 2025 · Operations

Enable Keycloak SSO for Nightingale Monitoring with OAuth2/OIDC

This guide walks you through configuring Keycloak as an OAuth2/OIDC identity provider for Nightingale monitoring, covering prerequisites, client and user creation in Keycloak, Nightingale OIDC settings, and verification steps to achieve seamless single sign‑on in enterprise environments.

Identity ManagementKeycloakMonitoring
0 likes · 6 min read
Enable Keycloak SSO for Nightingale Monitoring with OAuth2/OIDC
IT Architects Alliance
IT Architects Alliance
Oct 11, 2022 · Information Security

Understanding SSO: When to Choose SAML vs OAuth2 & OIDC

This article explains the fundamentals of Single Sign‑On (SSO), compares the two most common protocols—SAML and OAuth2 (with OpenID Connect)—covers their terminology, workflows, benefits, and provides guidance on which to use in different scenarios.

AuthenticationIdentity ManagementOAuth2
0 likes · 10 min read
Understanding SSO: When to Choose SAML vs OAuth2 & OIDC
Programmer DD
Programmer DD
Feb 15, 2022 · Information Security

Keycloak Deprecates Most Adapters – Impact on Spring Security and Boot

On February 14, the Keycloak team announced the deprecation of most adapters—including Spring Security and Spring Boot integrations—detailing which adapters will be discontinued, which will remain, and a timeline for the phase‑out, while noting the rise of Spring Authorization Server as a replacement.

KeycloakOIDCadapters
0 likes · 4 min read
Keycloak Deprecates Most Adapters – Impact on Spring Security and Boot
Programmer DD
Programmer DD
Jul 16, 2021 · Information Security

Secure Your Spring Boot App with Keycloak: Step‑by‑Step OIDC Integration

This guide walks you through creating a Keycloak realm, registering a client, defining roles and mappings, obtaining and refreshing JWT tokens, and configuring a Spring Boot application with the Keycloak Spring Boot starter to protect endpoints via OIDC authentication.

AuthenticationAuthorizationJava
0 likes · 8 min read
Secure Your Spring Boot App with Keycloak: Step‑by‑Step OIDC Integration