Abstract
With growing enterprises' applications, services, and APIs and sharing them among different users (e.g., employees, clients, and partners) identity and access management (IAM) has become a crucial component of IT security. IAM enables organisations to identify, authenticate, and authorise users to access critical resources. Keycloak as an open-source IAM tool, officially supported by Red Hat, aims to protect web applications, and RESTful web services by managing the identity and entitlements of the users securely and efficiently. It is an individual server that can be run on a clustered mode or in a different place or port from applications, thus security features can be configured independently through Keycloak. Users are also completely isolated from applications that have no access to the users’ credentials. Furthermore, Keycloak provides protocols (e.g., OIDC, OAuth 2.0, and SAML) and features including user federation, single sign-on (SSO), two-factor authentication, centralised identity management, standard protocols, client adapters, etc. In this session, we are giving you an overview of Keycloak and how its features were adopted and implemented as a component of the EDP to manage widespread access to environmental observation data.