Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      Sunshine And March Vibes (2025 Wallpapers Edition)

      May 31, 2025

      The Case For Minimal WordPress Setups: A Contrarian View On Theme Frameworks

      May 31, 2025

      How To Fix Largest Contentful Paint Issues With Subpart Analysis

      May 31, 2025

      How To Prevent WordPress SQL Injection Attacks

      May 31, 2025

      Windows 11 version 25H2: Everything you need to know about Microsoft’s next OS release

      May 31, 2025

      Elden Ring Nightreign already has a duos Seamless Co-op mod from the creator of the beloved original, and it’ll be “expanded on in the future”

      May 31, 2025

      I love Elden Ring Nightreign’s weirdest boss — he bargains with you, heals you, and throws tantrums if you ruin his meditation

      May 31, 2025

      How to install SteamOS on ROG Ally and Legion Go Windows gaming handhelds

      May 31, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      Oracle Fusion new Product Management Landing Page and AI (25B)

      May 31, 2025
      Recent

      Oracle Fusion new Product Management Landing Page and AI (25B)

      May 31, 2025

      Filament Is Now Running Natively on Mobile

      May 31, 2025

      How Remix is shaking things up

      May 30, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      Windows 11 version 25H2: Everything you need to know about Microsoft’s next OS release

      May 31, 2025
      Recent

      Windows 11 version 25H2: Everything you need to know about Microsoft’s next OS release

      May 31, 2025

      Elden Ring Nightreign already has a duos Seamless Co-op mod from the creator of the beloved original, and it’ll be “expanded on in the future”

      May 31, 2025

      I love Elden Ring Nightreign’s weirdest boss — he bargains with you, heals you, and throws tantrums if you ruin his meditation

      May 31, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Development»How to Use Keycloak for Identity and Access Management

    How to Use Keycloak for Identity and Access Management

    January 23, 2025

    Whether your deployment requires logins from hundreds of thousands of end users or just a few remote admins, there’s no escaping the need to properly control access to your infrastructure. And integrating those logins with industry-standard tools like LDAP and Active Directory can cut down the amount of work it’ll take to get yourself up and running.

    Keycloak is an enterprise-ready, open source identity access management (IAM) solution that’s scalable, extensible, and robust. And it really doesn’t need all that much care and feeding to launch a simple implementation.

    This article will introduce you to the technology and the ways it can integrate best-practice authentication into your infrastructure.

    Note on Hitachi Contributions to Keycloak:

    Takashi Norimatsu works for Hitachi and has been the official maintainer of Keycloak since late 2021. Hitachi has been actively contributing to Keycloak since at least 2018.

    Hitachi appears to be doing more strategically with open source in general and Keycloak in particular. I believe strong, continued corporate support as part of an open source project is a positive sign, but at the very least, you should be aware of the corporate support for Keycloak during your assessment.

    1fc95289-7777-4c9f-a651-00bd8a44b517

    Getting Started with Keycloak

    I’ll begin with a brief “quick start”. As you can see from this screenshot, Keycloak will run happily on multiple platforms. And their product documentation is excellent.

    a84122e2-1e72-43a8-86f2-aeaddd0c3a3b

    But here’s some very simple one-command Docker syntax that will create a fully-functioning live Keycloak instance on your local machine:

    docker run -p 8080:8080 
         -e KC_BOOTSTRAP_ADMIN_USERNAME=admin 
         -e KC_BOOTSTRAP_ADMIN_PASSWORD=admin quay.io/keycloak/keycloak:26.0.7 start-dev
    

    That’s it. After a minute or two, you can open the administration interface on your browser using the appropriate variation of:

    localhost:8080

    Based on the Docker command defaults, you’ll log in using admin and admin. Spend a few minutes digging into the environment to get a feel for the tools that are available.

    What Keycloak Offers

    Ok. So why do you need Keycloak? Because it supports all the functionality demanded by modern deployments. That’ll include Single Sign-On (SSO) to allow seamless authentication across multiple applications and services, OAuth2, OpenID Connect, SAML protocol compliance, and federated identities using existing LDAP or Active Directory setups or through social media logins like Google.

    Keycloak incorporates the use of Multi-factor Authentication (MFA), built-in token revocation and expiration mechanisms, fine-grained permission management through Role-based Access Control (RBAC), and end-to-end encryption for sensitive communications. GDPR, HIPAA, and PCI DSS compliance are all possible.

    Keycloak comes with a RESTful API for scripted and programmatic interactions. That will encourage task automation to further optimize your authentication processes. And your developers can build their own custom plugins to fill any usability gaps you encounter.

    The Business Case for Keycloak

    Because Keycloak is open source, there’ll be no license fees to worry about. But open source gives you a lot more than just “cheap”.

    Keycloak cuts out vendor lock-in, allowing you to work with any platform or cloud provider – or move between them whenever necessary. It can also reduce overall operational costs through its simplified deployments (how much time did it take you to get that Docker image up and running?), automated updates, and no limits or cost penalties for even millions of monthly API calls or active users.

    Having out-of-the-box (and free) access to the full feature set (including RBAC and MFA) also simplifies planning and execution. There’s nothing “more” efficient than having to wait a week to access paywalled functionality until you get a response to your request for more project funding. All Keycloak features are just a click away.

    This radar chart illustrates the feature and functionality differences between Keycloak and its major commercial peers.

    Differences between Keycloak, Okta, Auth0, and Azure AD

    What to Consider

    As much as Keycloak has to offer, it won’t be the ideal choice for every use-case. And there are issues about which you should be aware up front.

    For instance, while getting started may be easy, fully configuring, say, clustering and high availability for Keycloak can be complex for teams without experience in identity management. Managing latency issues for very large deployments can be challenging.

    And while the documentation is generally excellent, it may not fully address specific complexities or edge-case scenarios. Similarly, there’s no resource within the Keycloak community that offers guaranteed support. Although there are excellent third-party providers out there.

    It’s possible that, because you’re not working with a commercial product, demonstrating regulatory compliance could be a bit more involved. You may also need to adapt your logging functionality to comply with various audit trail requirements.

    Finally, customizable environments risk introducing destabilizing complexity. The further off the beaten trail your plugins and API implementations wander, the greater the odds that something will eventually break – especially around version upgrades.

    Your Next Steps

    It’s always helpful to explore the journeys other people took with a new technology.

    So this page includes information on a fascinating case study involving a Japanese bank that was looking for an API solution and decided on Keycloak because of its high level API security features. Yuichi Nakamura’s presentation at the OpenShift Commons event in 2023 gives details how the bank successfully used Keycloak to secure their APIs. Nakamura, Hitachi Chief OSS Strategist, has recently been appointed as Head of Hitachi Open Source Program Office (OSPO).

    And this is an account of a university that implemented Kerberos Single Sign-On (SSO) for FreeIPA and configured Keycloak to connect with FreeIPA. The university successfully achieved user authentication from Keycloak by leveraging the SSSD option under “user federation” instead of relying on Kerberos or LDAP.

    I’m no stranger to Keycloak myself, having taught a Getting Started with Keycloak course on Pluralsight. For beginners, this may be a good place to start. A 10 day free trial is available.

    Source: freeCodeCamp Programming Tutorials: Python, JavaScript, Git & More 

    Facebook Twitter Reddit Email Copy Link
    Previous ArticleHow one tiny microphone solved my biggest video production problems
    Next Article DOOM: The Dark Ages PC requirements and specs — Can your computer run id Software’s latest shooter?

    Related Posts

    Security

    New Linux Flaws Allow Password Hash Theft via Core Dumps in Ubuntu, RHEL, Fedora

    June 1, 2025
    Security

    Exploit details for max severity Cisco IOS XE flaw now public

    June 1, 2025
    Leave A Reply Cancel Reply

    Continue Reading

    Distribution Release: SystemRescue 12.00

    News & Updates

    MultiXacts in PostgreSQL: usage, side effects, and monitoring

    Databases

    CVE-2025-3750 – WordPress Network Posts Extended Stored Cross-Site Scripting (XSS)

    Common Vulnerabilities and Exposures (CVEs)

    No Power Outage, Just a Data One: Nova Scotia Hit by Ransomware Surge

    Development

    Highlights

    Development

    Dark Web Actor Claims to Pilfer 2TB of Compressed Data from QuoteWizard

    June 3, 2024

    Sp1d3r, a dark web actor, allegedly stole 2 TB of compressed data from QuoteWizard, a…

    The second annual Triple-I Initiative Showcase featured more than 40 indie games — Here’s every title showcased for Xbox and PC

    May 5, 2025

    padthv1 is an old-school polyphonic additive synthesizer

    April 10, 2025

    jdSystemMonitor is a desktop-independent system monitor for Linux

    May 5, 2025
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.