Keycloak - Identity and Access Management for Modern Applications
Stian Thorgersen
Keycloak - Identity and Access Management for Modern Applications
Harness the power of Keycloak, OpenID Connect, and OAuth 2.0
by Stian Thorgersen, Pedro Igor Silva
Summary
This practical guide covers Keycloak from installation to advanced configuration. Learn how to secure applications using OpenID Connect and OAuth 2.0, configure social login, implement fine-grained authorization, manage users and roles, and integrate Keycloak with existing infrastructure.
Why Read This Book
Keycloak is one of the most popular open-source identity providers, and this book, written by its creators, is the definitive guide. It provides hands-on coverage of real-world IAM scenarios using a production-grade platform.
Key Takeaways
- Installing and configuring Keycloak for production environments
- Securing applications with OpenID Connect and OAuth 2.0
- User management, social login, and identity brokering
- Fine-grained authorization with Keycloak
- Customizing and extending Keycloak with SPIs
Who Should Read This
Developers and architects implementing identity solutions with Keycloak or evaluating open-source IAM platforms.
Frequently Asked Questions
What is "Keycloak - Identity and Access Management for Modern Applications" about?
This practical guide covers Keycloak from installation to advanced configuration. Learn how to secure applications using OpenID Connect and OAuth 2.0, configure social login, implement fine-grained authorization, manage users and roles, and integrate Keycloak with existing infrastructure.
Who should read "Keycloak - Identity and Access Management for Modern Applications"?
Developers and architects implementing identity solutions with Keycloak or evaluating open-source IAM platforms.
What are the key takeaways from "Keycloak - Identity and Access Management for Modern Applications"?
Key takeaways include: Installing and configuring Keycloak for production environments; Securing applications with OpenID Connect and OAuth 2.0; User management, social login, and identity brokering.