Join us in creating a digital world that people trust!
Our mission is to support our customers in digitisation with secure and reliable software. To this end, we create solutions for dealing with digital identities that every organisation can use and flexibly adapt.
You want to be part of the team?
Apply now and get to know us!
FAQ
What do we actually do?
We are all about Keycloak and Identity
and Access Management (IAM).
What is IAM?
Keycloak is an open source tool that enables you to secure your web applications or services more easily. Because in times of GDPR and constant cyber attacks on the internet, security and data protection are the most important topics.
Because in times of GDPR and constant cyber attacks on the internet, security and data protection are the most important topics.
And this is exactly where Keycloak can provide good support. Because Keycloak protects your application from unauthorised access.
Only known and authenticated users are still allowed to access your application.
This way, your application no longer has to take care of user administration or request passwords.
Keycloak is the specialised service for user registration. When logging in, you want to know who is logging in by entering a user name or an e-mail address (identification of the user) and whether they are who they say they are (authentication of the user).
The user authenticates himself by entering, for example, a password or PIN. In the meantime, this also includes so-called two-factor procedures, which additionally check for another characteristic. This can be, for example, a certificate that is stored on a mobile phone or an USB flash drive.
You want to know more about Keycloak? Then take a look at our blog .
What does IAM mean?
Identity and access management is a term from information technology.
IAM regulates processes and applications that are used in organisations. For example, identity management, role management or access management. And this both internally, i.e. for the employees, and externally, i.e. for the customers. And it is precisely this data that must be centrally managed and administered. And as securely as possible.
The identity of a user (Identiy) and their access rights (Access) play a major role.
Because often you have different rights for each application, platform or system. So what am I allowed to do on this system, which functions can I use, which accesses do I have, which data can I view and so on.
As with Keycloak, the idea is that you have to authenticate yourself as a user (who am I) and that you are then authorised on the basis of the roles and rights you have been assigned (what am I allowed to do). And thus can use the corresponding systems.
But that is not everything. What happens when a user is no longer authorised or an employee leaves a company. This is called user life cycle. And this can also be mapped by an IAM system.
If, for example, an employee leaves a company, the IAM system ensures that he or she no longer has access after leaving. And this applies to all systems or applications that he or she has used.
If you want to learn more about our IAM system, take a look at Keycloak PLUS.