by Helena | Dec 20, 2023 | Keycloak, Technics, Unkategorisiert
A great team: SCIM and Keycloak. In today’s blog post, we take a closer look at why this combination can be the perfect choice, especially in terms of data protection. ⏱ Reading time: 2 minutes SCIM and Keycloak: More data protection for digital...
by Helena | Nov 13, 2023 | Keycloak, Technics
The General Data Protection Regulation (GDPR) is an important foundation for ensuring everyone’s privacy. Still feared by many organisations, today we take a look at the world of GDPR compliance and how Keycloak makes it easy to manage user data transparently. ⏱...
by Helena | Sep 27, 2023 | Keycloak, Technics, Unkategorisiert
Keycloak has established itself as a powerful tool to meet many requirements for a robust identity and access management solution. In this blog post, we will take a close look at the advantages and disadvantages of Keycloak and show in which cases it makes sense to...
by Helena | Jul 21, 2023 | Identity Management, Keycloak, Technics, Unkategorisiert
In the world of digital identities, there is a term that is appearing more and more frequently: Keycloak. But what exactly is behind the open source software? ⏱ Reading time: 3 minutes Keycloak – the key to effective identity and access management More...
by Helena | Mar 18, 2023 | Identity Management, Technics, Unkategorisiert
Today, let’s expand our vocabulary to include the term “MFA Fatigue”: Multi-Factor Authentication Fatigue. ⏱ Reading time: 3 minutes What is MFA Fatigue? Is push MFA actually safe? When we at intension made two-factor authentication mandatory...
by Helena | May 14, 2022 | Identity Management, Technics, Unkategorisiert
For digital services, whether web service, shop or app, choosing the right access control strategy is critical to securing the technical resources and thus access to data and functions of an application. ⏱ Reading time: 3 minutes What is role and policy based...