


Digitalisation – why we need structure in addition to Keycloak & Co.
An article by Stephanie Ta, Syntlogo GmbH: Today, many successful operators rely on Keycloak. However, it is only the first step towards a holistic IAM system, because the requirements have increased due to modern digitalisation and data protection requirements. For...
CIAM versus IAM
CIAM – Customer IAM – just a variation of IAM? The term CIAM – Customer Identity & Access Management – describes the identification and assignment of access permissions to “external” users of an organisation such as, for example, customers, partners, members of...
Use of Keycloak .NET adapter in Microsoft® Visual Studio
Keycloak .NET adapter How to also use the Keycloak authentication functions in Microsoft® Visual Studio and .NET environments In this article, we will show you how you can install an instance of Keycloak that protects pages from an ASP.Net MVC application. It uses the...