par Mathieu PASSENAUD | Jan 26, 2026 | Gestion des Identités
Keycloak OAuth2-Proxy Configuration Generator: with our main partner Please-Open.It we strongly advocate the use of authentication proxy pattern. As we mentioned in our authentication proxy article, this architectural approach is one of the most efficient ways to...
par Mathieu PASSENAUD | Déc 24, 2025 | Communauté, Gestion des Identités, Open Source, Sécurité, SSO
How to simplify authentication in any application with an authentication proxy ? With our main partner please-open.it, we implement authentication solutions for applications across various languages and frameworks. Over the years, we’ve encountered the same challenges...
par Mathieu PASSENAUD | Août 6, 2025 | Communauté, Gestion des Identités, SSO
A JWT decoder in the system tray, tips and tricks from our main partner Please-Open-IT to enhance your productivity setting up KeycCloak. With our customers, we decode JWT tokens dozens of times a day. We were tired of opening jwt.io each time so we built a simple...
par Mathieu PASSENAUD | Déc 10, 2024 | Gestion des Identités, Open Source, SSO
Keycloak roles restriction and full scopes : for security concerns, you must restrict roles to a subset through the « Full Scope Allowed » Switch as by default a client has « roles » scope as « default » so that a user will have all affected clients roles in its...
par Loïc Mercier Des Rochettes | Oct 3, 2024 | Communauté, Gestion des Identités, LDAP, Open Source, SSO
Get rid of your old Active directory/LDAP with keycloak and a small piece of custom software : just a POC for a LDAP bind proxy to log to KeyCloak with LDAP. TL;DR How to spawn a simple bind LDAP proxy for keycloak OIDC password grant in a nutshell. Disclaimer and...
par Mathieu PASSENAUD | Août 21, 2024 | Communauté, Open Source, SSO
This article will share how to enrich native metrics in Keycloak with Micrometer and add yours. Special thanks Thanks to all contributors who built one of the most use Keycloak plugin : https://github.com/aerogear/keycloak-metrics-spi TL/DR We developed a new metrics...
par Mathieu PASSENAUD | Mar 7, 2024 | Gestion des Identités, Open Source, SSO
In this article we will explain through an example what is and how to use Keycloak Authenticator. In Keycloak, an « authenticator » is a step in an authentication process, what we call « Authentication flow ». An impressive list of authenticators are available with...
par Mathieu PASSENAUD | Sep 19, 2023 | Communauté, Gestion des Identités, SSO
This article describes how to use your Keycloak or RedHat SSO as SSO for Airtable. Only available for the « entreprise » plan, you can add your own SSO to your Airtable organization. SSO feature in Airtable Airtable has in their « entreprise » plan a support of SAML...
par Loïc Mercier Des Rochettes | Sep 5, 2022 | Gestion des Identités, Open Source, Sécurité, SSO
In this article we will discuss about Postgres OAuth2 Authentication and why do we need an oauth2 on postgres. Common SSO advantages SSO (in our case with Keycloak) represents many advantages : More than a unique password, a unique login (advantages over an ldap/pg...
par janua | Jan 19, 2022 | Open Source, Sécurité, SSO
Due to the current COVID19 situation, we completely renewed our training material, with our partner, in order to give our customers the possibility of a remote KeyCloak fully digital online training. We created a VM classroom environment using Vagrant so that...
par Mathieu PASSENAUD | Jan 5, 2022 | Communauté, Gestion des Identités, SSO
Keycloak.X will become the reference soon. According to the Keycloak Blogpost, Keycloak 18 will not support Wildfly, after that no wildfly version… Now it is time to migrate! We are still waiting for a Kubernetes operator with Keycloak.X, in this post we will...
par Mathieu PASSENAUD | Août 13, 2021 | Gestion des Identités, Sécurité, SSO
UMA 2.0 is known as a delegation of authorizations standard but could be sometimes tricky and unclear. Keycloak is fully compatible with UMA 2.0. With a tool developped by our partner please-open.it, let’s see how to use Keycloak and UMA 2.0 with bash. This...
par janua | Juin 8, 2021 | Gestion des Identités, Sécurité, SSO
We receive numerous inquiries about sizing Keycloak or Redhat SSO projects and installation. Nicolas Massé, solution architect from Redhat did a great job and wrote a usefull article to answer this recurrent question :...
par janua | Oct 2, 2019 | Communauté, Gestion des Identités, SSO
In this article, Janua’s CTO shares tips and tricks about understanding Oauth2-OpenID scope usage with Keycloak. 1) What are scopes used for ? Scopes is basic feature of Identity and Access Management. Scopes are like a court yard. Scopes allow to define...
par janua | Sep 13, 2019 | Communauté, SSO
Using Impersonation with Keycloak : Impersonation is very useful feature in IAM system today. It allows to execute an action being logged as dedicated admin-user to act on specific user actions, as if it was the genuine user who was performing the action. We will...