by Helena | Apr 17, 2024 | Keycloak, Unkategorisiert
Welcome back to our blog series “Common problems with Keycloak”. In today’s article, the third in our series, we look at an essential security aspect that is often overlooked: the use of a reverse proxy or load balancer to protect your Keycloak...
by Helena | Mar 4, 2024 | Keycloak, Unkategorisiert
After looking at how to avoid the single point of failure in the first instalment of our “Common problems with Keycloak” series, we are now looking at another essential foundation: multi-factor authentication. ⏱ Reading time: 3 minutes The use of...
by Helena | Dec 20, 2023 | Keycloak, Technics, Unkategorisiert
A great team: SCIM and Keycloak. In today’s blog post, we take a closer look at why this combination can be the perfect choice, especially in terms of data protection. ⏱ Reading time: 2 minutes SCIM and Keycloak: More data protection for digital...
by Helena | Sep 27, 2023 | Keycloak, Technics, Unkategorisiert
Keycloak has established itself as a powerful tool to meet many requirements for a robust identity and access management solution. In this blog post, we will take a close look at the advantages and disadvantages of Keycloak and show in which cases it makes sense to...
by Helena | Jul 21, 2023 | Identity Management, Keycloak, Technics, Unkategorisiert
In the world of digital identities, there is a term that is appearing more and more frequently: Keycloak. But what exactly is behind the open source software? ⏱ Reading time: 3 minutes Keycloak – the key to effective identity and access management More...