SlideShare a Scribd company logo
6
Most read
10
Most read
14
Most read
Open Source Identity and Access
management with Keycloak
21st
December 2024
Cloud Native Ahmedabad Meetup #13
i-hub Gujarat, Prajna Puram, KCG Campus, opp. PRL, Navrangpura, Ahmedabad
Anshul Patel
Cloud Consultant at Toptal
Decade of experience in architecting, implementing, and
optimizing cloud infrastructure, site-reliability, and
operations to maximize the business value.
Previously worked at Adani Enterprises, Woven by Toyota,
Infostretch(now Apexon), Talentica, Amdocs, Elitecore(now
Sterlite Tech)
Who am I?
https://anshulpatel.in
Identity and Access
Management (IAM)
What is IAM?
● Identification: Who is the user?
● Authentication: Can they prove their
identity?
● Authorization: What can they access?
● Accountability: Monitoring and auditing
user actions.
Why IAM solution matters?
● Security: Prevents unwanted access to the systems
● Compliance: Helps organization meet regulatory standards
● Efficiency: Helps IT teams to streamline user access control
● User productivity & experience: Provides seamless access to
resources
● Developer productivity & experience: Development team
can leverage out of the box functionalities
Components of IAM solution
● Authentication
● User Management
● Group Management
● Roles
● Identity brokering &
federation
● Access control
● Policies
● Monitoring and
Auditing
● Permission/Scope
Keycloak
What is Keycloak?
● Open source identity and access management solution
● Started by Wildfly community project under stewardship of
RedHat
● Donated to CNCF in April 2023, currently it is in CNCF
incubating stage.
Why Keycloak?
● Infrastructure agnostic
● Proven and battle tested
● Commercial support available (RedHat build of Keycloak)
● Multiple protocol support (OpenID, Oauth 2.0, SAML 2.0)
● Single Sign On (SSO) support
Why Keycloak?
● Flexible
○ Multiple identity provider support (IdP)
○ Integrations & Extensions
○ Modular, standalone, clustered, and cross-site deployment
topologies
● UI Administration console & REST API available
● Third party IaC available
Keycloak Core Concepts
● Realm: Manages set of users, groups, credentials, roles, and clients
● Users: Entities which needs to login
● Groups: Collection of users
● Clients: Entities which requests keycloak for authentication and
authorization (for e.g. OIDC, SAML v2.0)
● Flows: Authentication, Self-registration, Password recovery, etc
Keycloak Core Concepts
● Roles:
○ Realm Role: Specific to realm
○ Client Role: Specific to client
● Client scopes: Permissions that client is requesting on behalf of
the user
● Identity provider: External OIDC and SAML IdP providers
● Events: User and admin events for audit
Authorization
● Resource Server
● Resource
● Policy
● Scope
● Permission
● User Managed Access
Reference:https://www.keycloak.org/do
cs/latest/authorization_services/index.h
tml
Example OIDC with Keycloak
Authorization code flow
Recommended Reads
● Keycloak - Identity and Access Management for Modern
Applications: Harness the power of Keycloak, OpenID Connect, and
OAuth 2.0 to secure applications , Second Edition
● Awesome-keycloak
● Opensource-identity-access-management-keycloak
● Keycloak high availability
● Observability
Thank you & Questions

More Related Content

Similar to Open Source Identity and Access management with Keycloak.pdf (20)

PDF
Five Things You Gotta Know About Modern Identity
Mark Diodati
 
PPTX
Keycloak for Science Gateways - SGCI Technology Sampler Webinar
marcuschristie
 
PDF
Securing FIWARE Architectures
FIWARE
 
PDF
Identity & Access Management for Securing DevOps
Eryk Budi Pratama
 
PPTX
Centralisation of IAM (Identity and Access Management) 7 modern trends every ...
Ibrahim Muhammadi
 
PPTX
Identity & Access Management - Securing Your Data in the 21st Century Enterprise
Lance Peterman
 
PPTX
Draft: building secure applications with keycloak (oidc/jwt)
Abhishek Koserwal
 
PPTX
IAM Overview Identiverse 2018
Brian Campbell
 
PPTX
Jagatjyoti dash
Jagatjyoti Dash
 
PDF
What is Identity and Access Management.pdf
Rosy G
 
PDF
Denver ISSA Chapter Meetings - Changing the Security Paradigm
Identity Defined Security Alliance
 
PPTX
Secure your app with keycloak
Guy Marom
 
PPTX
Identity and access management
Piyush Jain
 
PDF
Secure Spring Boot Microservices with Keycloak
Red Hat Developers
 
PPTX
Identity management and single sign on - how much flexibility
Ryan Dawson
 
PPTX
OneIdentity - A Future-Ready Approach to IAM
Adrian Dumitrescu
 
PPT
Identity And Access Management Overview (IAM)
SISTechnologies
 
ODP
Building open source identity infrastructures
Francesco Chicchiriccò
 
PPTX
unit4.pptx
ApurvSingh65
 
PDF
FIWARE Training: Identity Management and Access Control
FIWARE
 
Five Things You Gotta Know About Modern Identity
Mark Diodati
 
Keycloak for Science Gateways - SGCI Technology Sampler Webinar
marcuschristie
 
Securing FIWARE Architectures
FIWARE
 
Identity & Access Management for Securing DevOps
Eryk Budi Pratama
 
Centralisation of IAM (Identity and Access Management) 7 modern trends every ...
Ibrahim Muhammadi
 
Identity & Access Management - Securing Your Data in the 21st Century Enterprise
Lance Peterman
 
Draft: building secure applications with keycloak (oidc/jwt)
Abhishek Koserwal
 
IAM Overview Identiverse 2018
Brian Campbell
 
Jagatjyoti dash
Jagatjyoti Dash
 
What is Identity and Access Management.pdf
Rosy G
 
Denver ISSA Chapter Meetings - Changing the Security Paradigm
Identity Defined Security Alliance
 
Secure your app with keycloak
Guy Marom
 
Identity and access management
Piyush Jain
 
Secure Spring Boot Microservices with Keycloak
Red Hat Developers
 
Identity management and single sign on - how much flexibility
Ryan Dawson
 
OneIdentity - A Future-Ready Approach to IAM
Adrian Dumitrescu
 
Identity And Access Management Overview (IAM)
SISTechnologies
 
Building open source identity infrastructures
Francesco Chicchiriccò
 
unit4.pptx
ApurvSingh65
 
FIWARE Training: Identity Management and Access Control
FIWARE
 

More from Anshul Patel (12)

PDF
Safeguarding Container Supply Chain - Anshul Patel
Anshul Patel
 
PPTX
Chaos engineering with Litmus Chaos Framework
Anshul Patel
 
PDF
Docker Fundamentals
Anshul Patel
 
PPTX
Chaos Engineering with Gremlin Platform
Anshul Patel
 
PDF
Chaos Engineering
Anshul Patel
 
PPTX
Introduction to docker_notary_v1.0.0
Anshul Patel
 
PPTX
Linux Operating System Fundamentals
Anshul Patel
 
PPTX
Building CLI Applications with Golang
Anshul Patel
 
PPTX
Linux kit meetup_v1.0.0
Anshul Patel
 
PPTX
Cloud Computing Security
Anshul Patel
 
PPTX
Meetup on Apache Zookeeper
Anshul Patel
 
PPTX
AWS ECS Meetup Talentica
Anshul Patel
 
Safeguarding Container Supply Chain - Anshul Patel
Anshul Patel
 
Chaos engineering with Litmus Chaos Framework
Anshul Patel
 
Docker Fundamentals
Anshul Patel
 
Chaos Engineering with Gremlin Platform
Anshul Patel
 
Chaos Engineering
Anshul Patel
 
Introduction to docker_notary_v1.0.0
Anshul Patel
 
Linux Operating System Fundamentals
Anshul Patel
 
Building CLI Applications with Golang
Anshul Patel
 
Linux kit meetup_v1.0.0
Anshul Patel
 
Cloud Computing Security
Anshul Patel
 
Meetup on Apache Zookeeper
Anshul Patel
 
AWS ECS Meetup Talentica
Anshul Patel
 
Ad

Recently uploaded (20)

PPTX
OpenChain @ OSS NA - In From the Cold: Open Source as Part of Mainstream Soft...
Shane Coughlan
 
PDF
Technical-Careers-Roadmap-in-Software-Market.pdf
Hussein Ali
 
PPTX
Coefficient of Variance in IBM SPSS Statistics Version 31.pptx
Version 1 Analytics
 
PPTX
Homogeneity of Variance Test Options IBM SPSS Statistics Version 31.pptx
Version 1 Analytics
 
PDF
Automate Cybersecurity Tasks with Python
VICTOR MAESTRE RAMIREZ
 
PDF
NEW-Viral>Wondershare Filmora 14.5.18.12900 Crack Free
sherryg1122g
 
PPTX
Foundations of Marketo Engage - Powering Campaigns with Marketo Personalization
bbedford2
 
PPTX
Agentic Automation: Build & Deploy Your First UiPath Agent
klpathrudu
 
PDF
4K Video Downloader Plus Pro Crack for MacOS New Download 2025
bashirkhan333g
 
PDF
[Solution] Why Choose the VeryPDF DRM Protector Custom-Built Solution for You...
Lingwen1998
 
PPTX
Change Common Properties in IBM SPSS Statistics Version 31.pptx
Version 1 Analytics
 
PDF
Empower Your Tech Vision- Why Businesses Prefer to Hire Remote Developers fro...
logixshapers59
 
PPTX
Comprehensive Risk Assessment Module for Smarter Risk Management
EHA Soft Solutions
 
PDF
MiniTool Partition Wizard 12.8 Crack License Key LATEST
hashhshs786
 
PDF
Wondershare PDFelement Pro Crack for MacOS New Version Latest 2025
bashirkhan333g
 
PDF
AOMEI Partition Assistant Crack 10.8.2 + WinPE Free Downlaod New Version 2025
bashirkhan333g
 
PDF
Add Background Images to Charts in IBM SPSS Statistics Version 31.pdf
Version 1 Analytics
 
PDF
TheFutureIsDynamic-BoxLang witch Luis Majano.pdf
Ortus Solutions, Corp
 
PPTX
Home Care Tools: Benefits, features and more
Third Rock Techkno
 
PPTX
Agentic Automation Journey Session 1/5: Context Grounding and Autopilot for E...
klpathrudu
 
OpenChain @ OSS NA - In From the Cold: Open Source as Part of Mainstream Soft...
Shane Coughlan
 
Technical-Careers-Roadmap-in-Software-Market.pdf
Hussein Ali
 
Coefficient of Variance in IBM SPSS Statistics Version 31.pptx
Version 1 Analytics
 
Homogeneity of Variance Test Options IBM SPSS Statistics Version 31.pptx
Version 1 Analytics
 
Automate Cybersecurity Tasks with Python
VICTOR MAESTRE RAMIREZ
 
NEW-Viral>Wondershare Filmora 14.5.18.12900 Crack Free
sherryg1122g
 
Foundations of Marketo Engage - Powering Campaigns with Marketo Personalization
bbedford2
 
Agentic Automation: Build & Deploy Your First UiPath Agent
klpathrudu
 
4K Video Downloader Plus Pro Crack for MacOS New Download 2025
bashirkhan333g
 
[Solution] Why Choose the VeryPDF DRM Protector Custom-Built Solution for You...
Lingwen1998
 
Change Common Properties in IBM SPSS Statistics Version 31.pptx
Version 1 Analytics
 
Empower Your Tech Vision- Why Businesses Prefer to Hire Remote Developers fro...
logixshapers59
 
Comprehensive Risk Assessment Module for Smarter Risk Management
EHA Soft Solutions
 
MiniTool Partition Wizard 12.8 Crack License Key LATEST
hashhshs786
 
Wondershare PDFelement Pro Crack for MacOS New Version Latest 2025
bashirkhan333g
 
AOMEI Partition Assistant Crack 10.8.2 + WinPE Free Downlaod New Version 2025
bashirkhan333g
 
Add Background Images to Charts in IBM SPSS Statistics Version 31.pdf
Version 1 Analytics
 
TheFutureIsDynamic-BoxLang witch Luis Majano.pdf
Ortus Solutions, Corp
 
Home Care Tools: Benefits, features and more
Third Rock Techkno
 
Agentic Automation Journey Session 1/5: Context Grounding and Autopilot for E...
klpathrudu
 
Ad

Open Source Identity and Access management with Keycloak.pdf

  • 1. Open Source Identity and Access management with Keycloak 21st December 2024 Cloud Native Ahmedabad Meetup #13 i-hub Gujarat, Prajna Puram, KCG Campus, opp. PRL, Navrangpura, Ahmedabad
  • 2. Anshul Patel Cloud Consultant at Toptal Decade of experience in architecting, implementing, and optimizing cloud infrastructure, site-reliability, and operations to maximize the business value. Previously worked at Adani Enterprises, Woven by Toyota, Infostretch(now Apexon), Talentica, Amdocs, Elitecore(now Sterlite Tech) Who am I? https://anshulpatel.in
  • 4. What is IAM? ● Identification: Who is the user? ● Authentication: Can they prove their identity? ● Authorization: What can they access? ● Accountability: Monitoring and auditing user actions.
  • 5. Why IAM solution matters? ● Security: Prevents unwanted access to the systems ● Compliance: Helps organization meet regulatory standards ● Efficiency: Helps IT teams to streamline user access control ● User productivity & experience: Provides seamless access to resources ● Developer productivity & experience: Development team can leverage out of the box functionalities
  • 6. Components of IAM solution ● Authentication ● User Management ● Group Management ● Roles ● Identity brokering & federation ● Access control ● Policies ● Monitoring and Auditing ● Permission/Scope
  • 8. What is Keycloak? ● Open source identity and access management solution ● Started by Wildfly community project under stewardship of RedHat ● Donated to CNCF in April 2023, currently it is in CNCF incubating stage.
  • 9. Why Keycloak? ● Infrastructure agnostic ● Proven and battle tested ● Commercial support available (RedHat build of Keycloak) ● Multiple protocol support (OpenID, Oauth 2.0, SAML 2.0) ● Single Sign On (SSO) support
  • 10. Why Keycloak? ● Flexible ○ Multiple identity provider support (IdP) ○ Integrations & Extensions ○ Modular, standalone, clustered, and cross-site deployment topologies ● UI Administration console & REST API available ● Third party IaC available
  • 11. Keycloak Core Concepts ● Realm: Manages set of users, groups, credentials, roles, and clients ● Users: Entities which needs to login ● Groups: Collection of users ● Clients: Entities which requests keycloak for authentication and authorization (for e.g. OIDC, SAML v2.0) ● Flows: Authentication, Self-registration, Password recovery, etc
  • 12. Keycloak Core Concepts ● Roles: ○ Realm Role: Specific to realm ○ Client Role: Specific to client ● Client scopes: Permissions that client is requesting on behalf of the user ● Identity provider: External OIDC and SAML IdP providers ● Events: User and admin events for audit
  • 13. Authorization ● Resource Server ● Resource ● Policy ● Scope ● Permission ● User Managed Access Reference:https://www.keycloak.org/do cs/latest/authorization_services/index.h tml
  • 14. Example OIDC with Keycloak Authorization code flow
  • 15. Recommended Reads ● Keycloak - Identity and Access Management for Modern Applications: Harness the power of Keycloak, OpenID Connect, and OAuth 2.0 to secure applications , Second Edition ● Awesome-keycloak ● Opensource-identity-access-management-keycloak ● Keycloak high availability ● Observability
  • 16. Thank you & Questions