User lifecycle management

User lifecycle management

Digital identities as part of the user lifecycle: why you should switch to centralised user management. An article by Stephanie Ta, Syntlogo GmbH: When it comes to web portal security, everyone thinks of password security. But passwords only represent a small...
Digitalisation – why we need structure in addition to Keycloak & Co.

Digitalisation – why we need structure in addition to Keycloak & Co.

An article by Stephanie Ta, Syntlogo GmbH: Today, many successful operators rely on Keycloak. However, it is only the first step towards a holistic IAM system, because the requirements have increased due to modern digitalisation and data protection requirements. For...
CIAM versus IAM

CIAM versus IAM

CIAM – Customer IAM – just a variation of IAM? The term CIAM – Customer Identity & Access Management – describes the identification and assignment of access permissions to “external” users of an organisation such as, for example, customers, partners, members of...
Use of Keycloak .NET adapter in Microsoft® Visual Studio

Use of Keycloak .NET adapter in Microsoft® Visual Studio

Keycloak .NET adapter How to also use the Keycloak authentication functions in Microsoft® Visual Studio and .NET environments In this article, we will show you how you can install an instance of Keycloak that protects pages from an ASP.Net MVC application. It uses the...
Keycloak as Identity Broker

Keycloak as Identity Broker

How Keycloak, as identity broker, simplifies the online world for companies and customers. Keycloak in production as identity broker between different identity-managing systems. Today, customers expect more convenience in e-commerce than a few years ago. Transactions...