OUR BLOG
Simply stay on the ball
The latest information dealing with all areas of Identity & Access Management. Read interesting articles on innovations as well as changes in Login-Master and the open source technology Keycloak.

Advantages, prejudices and solutions of single sign-on
Single sign-on makes logging in much easier, faster and more secure for users. But there are also prejudices against it. What are the advantages of introducing SSO?

NIS-2: Implement multi-factor authentication with Keycloak
NIS-2: What options does MFA technology offer? And how can Keycloak complement existing directory services such as LDAP and AD in times of NIS-2 to easily implement secure multi-factor authentication?

The cyber risk of orphaned accounts – an interview with Stephanie Ta
The cyber risk of unused or orphaned accounts is underestimated every day. It is well known that this is a huge gateway for hackers. Stephanie explains why this is the case and what you can do about it in an interview with Website Planet.

Best Practices Cyber Security: Inactive Accounts
Digital dead bodies or inactive accounts can be a nightmare for any organization. Find out what you can do about this in our blog post on best practice cyber security.

Crucial facts about installing Keycloak
Best practices: Keycloak running on Windows, Docker and on a virtual machine.
We explain the advantages and disadvantages to you.

How to secure Java-based web apps right
Spring Security is a widely used framework for securing Java-based web apps. Keycloak significantly increases security for users and operators of such applications. Is it enough or should one dig deeper into the toolbox to be on the safe side?

The kingdom of Keycloak
If you want to implement internet access via Keycloak, you cannot avoid the use of realms. Read here how to plan them intelligently.

User lifecycle management
Digital identities as part of the user lifecycle: why you should switch to centralised user management. An article by Stephanie Ta, Syntlogo GmbH:...

Secure access control in Quarkus web applications
Quarkus and Keycloak: Two that complement each other beautifully. Because with Keycloak and its SecuRole extension, you make Quarkus very secure on the web. You can read how to do this in our blog.

CIAM versus IAM
CIAM – Customer IAM – just a variation of IAM? The term CIAM – Customer Identity & Access Management – describes the identification and...