Digital identities as part of the user lifecycle: why you should switch to centralised user management. An article by Stephanie Ta, Syntlogo GmbH: When it comes to web portal security, everyone thinks of password security. But passwords only represent a small...
An article by Stephanie Ta, Syntlogo GmbH: Today, many successful operators rely on Keycloak. However, it is only the first step towards a holistic IAM system, because the requirements have increased due to modern digitalisation and data protection requirements. For...
CIAM – Customer IAM – just a variation of IAM? The term CIAM – Customer Identity & Access Management – describes the identification and assignment of access permissions to “external” users of an organisation such as, for example, customers, partners, members of...
Keycloak .NET adapter How to also use the Keycloak authentication functions in Microsoft® Visual Studio and .NET environments In this article, we will show you how you can install an instance of Keycloak that protects pages from an ASP.Net MVC application. It uses the...
How Keycloak, as identity broker, simplifies the online world for companies and customers. Keycloak in production as identity broker between different identity-managing systems. Today, customers expect more convenience in e-commerce than a few years ago. Transactions...