OUR BLOG

Simply stay on the ball

The latest information dealing with all areas of Identity & Access Management. Read interesting articles on innovations as well as changes in Login-Master and the open source technology Keycloak.

How to secure Java-based web apps right

How to secure Java-based web apps right

Spring Security is a widely used framework for securing Java-based web apps. Keycloak significantly increases security for users and operators of such applications. Is it enough or should one dig deeper into the toolbox to be on the safe side?

The kingdom of Keycloak

The kingdom of Keycloak

If you want to implement internet access via Keycloak, you cannot avoid the use of realms. Read here how to plan them intelligently.

User lifecycle management

User lifecycle management

Digital identities as part of the user lifecycle: why you should switch to centralised user management. An article by Stephanie Ta, Syntlogo GmbH:...

Secure access control in Quarkus web applications

Secure access control in Quarkus web applications

Quarkus and Keycloak: Two that complement each other beautifully. Because with Keycloak and its SecuRole extension, you make Quarkus very secure on the web. You can read how to do this in our blog.

CIAM versus IAM

CIAM versus IAM

CIAM – Customer IAM – just a variation of IAM? The term CIAM – Customer Identity & Access Management – describes the identification and...

Keycloak as Identity Broker

Keycloak as Identity Broker

How Keycloak, as identity broker, simplifies the online world for companies and customers. Keycloak in production as identity broker between...