par Mathieu PASSENAUD | Jan 26, 2026 | Gestion des Identités
Keycloak OAuth2-Proxy Configuration Generator: with our main partner Please-Open.It we strongly advocate the use of authentication proxy pattern. As we mentioned in our authentication proxy article, this architectural approach is one of the most efficient ways to...
par Mathieu PASSENAUD | Déc 24, 2025 | Communauté, Gestion des Identités, Open Source, Sécurité, SSO
How to simplify authentication in any application with an authentication proxy ? With our main partner please-open.it, we implement authentication solutions for applications across various languages and frameworks. Over the years, we’ve encountered the same challenges...
par Mathieu PASSENAUD | Déc 10, 2024 | Gestion des Identités, Open Source, SSO
Keycloak roles restriction and full scopes : for security concerns, you must restrict roles to a subset through the « Full Scope Allowed » Switch as by default a client has « roles » scope as « default » so that a user will have all affected clients roles in its...
par Loïc Mercier Des Rochettes | Oct 3, 2024 | Communauté, Gestion des Identités, LDAP, Open Source, SSO
Get rid of your old Active directory/LDAP with keycloak and a small piece of custom software : just a POC for a LDAP bind proxy to log to KeyCloak with LDAP. TL;DR How to spawn a simple bind LDAP proxy for keycloak OIDC password grant in a nutshell. Disclaimer and...