Keycloak - How it Works
When the user tries to navigate to a protected application, he is first redirected to the Keycloak authentication page. Once he enters his login credentials, Keycloak will redirect the user to the application with a code.
The application exchanges this authorization code with an ID and access token. The application can then use this ID or access token to authenticate the identity of the user.
Looking for IAM solutions?
WalkingTree - Single Sign on Solutions
We help organizations integrate and deploy keycloak so they can benefit fully from SSO.
Integrate with Existing Solutions
We provide Keycloak SSO integration support for organizations with existing solutions like Open LDAP and Active Directory.
We help enable social network logins for your apps using Keycloak instances. You can connect to OpenID providers like: Facebook, Github, LinkedIn, Google, etc.
We help implement Multi-factor authentication through Keycloak. This increases security by having users provide multiple identity factors for authentication.
Our Services - Identity management through Keycloak
Identity and Access Management
Manage user Identity and Access by creating custom roles and groups for user database – using this information to authenticate users.
Through Keycloak’s admin panel you can use Keycloak as a proxy between your users and another identity management provider.
External Identity Source Sync
Synchronize Keycloak with an external database. Using Keycloak User Storage API, create custom extensions for any user database.
Customize all pages displayed by Keycloak using HTML markups and CSS styles. Use custom JS scripts as part of customization for limitless possibilities.
Due to its support capabilities, we can integrate Keycloak on standard protocols like OAuth 2.0, OpenID Connect, and SAML 2.0.
Single Sign On
One time authentication. Users need to authenticated their identity only once and get access to multiple applications.