OUR BLOG

Simply stay on the ball

The latest information dealing with all areas of Identity & Access Management. Read interesting articles on innovations as well as changes in Login-Master and the open source technology Keycloak.

The kingdom of Keycloak

The kingdom of Keycloak

If you want to implement internet access via Keycloak, you cannot avoid the use of realms. Read here how to plan them intelligently.

User lifecycle management

User lifecycle management

Digital identities as part of the user lifecycle: why you should switch to centralised user management. An article by Stephanie Ta, Syntlogo GmbH:...

Secure access control in Quarkus web applications

Secure access control in Quarkus web applications

Quarkus and Keycloak: Two that complement each other beautifully. Because with Keycloak and its SecuRole extension, you make Quarkus very secure on the web. You can read how to do this in our blog.

CIAM versus IAM

CIAM versus IAM

CIAM – Customer IAM – just a variation of IAM? The term CIAM – Customer Identity & Access Management – describes the identification and...

Keycloak as Identity Broker

Keycloak as Identity Broker

How Keycloak, as identity broker, simplifies the online world for companies and customers. Keycloak in production as identity broker...