Secure access control in Quarkus web applications

Secure access control in Quarkus web applications

Quarkus and Keycloak: Two that complement each other beautifully. Because with Keycloak and its SecuRole extension, you make Quarkus very secure on the web. You can read how to do this in our blog.

Digitalisation – why we need structure in addition to Keycloak & Co.

Digitalisation – why we need structure in addition to Keycloak & Co.

An article by Stephanie Ta, Syntlogo GmbH: Today, many successful operators rely on Keycloak. However, it is only the first step towards a holistic IAM system, because the requirements have increased due to modern digitalisation and data protection requirements. For...
CIAM versus IAM

CIAM versus IAM

CIAM – Customer IAM – just a variation of IAM? The term CIAM – Customer Identity & Access Management – describes the identification and assignment of access permissions to “external” users of an organisation such as, for example, customers, partners, members of...
Use of Keycloak .NET adapter in Microsoft® Visual Studio

Use of Keycloak .NET adapter in Microsoft® Visual Studio

Keycloak .NET adapter How to also use the Keycloak authentication functions in Microsoft® Visual Studio and .NET environments In this article, we will show you how you can install an instance of Keycloak that protects pages from an ASP.Net MVC application. It uses the...
Keycloak as Identity Broker

Keycloak as Identity Broker

How Keycloak, as identity broker, simplifies the online world for companies and customers. Keycloak in production as identity broker between different identity-managing systems. Today, customers expect more convenience in e-commerce than a few years ago. Transactions...
How to extend Keycloak with professional IAM functions

How to extend Keycloak with professional IAM functions

Keycloak extensions you need to build an professional IAM solution. Keycloak compared to Login-Master Keycloak is used in numerous projects for authentication and authorisation in Web applications. Login-master is based on Keycloak, supplements its functionality in...