Reference Hub10
A Review on Identity and Access Management Server (KeyCloak)

A Review on Identity and Access Management Server (KeyCloak)

Divyabharathi D. N., Nagaraj G. Cholli
Copyright: © 2020 |Volume: 12 |Issue: 3 |Pages: 8
ISSN: 2643-7937|EISSN: 2643-7945|EISBN13: 9781522598916|DOI: 10.4018/IJSPPC.2020070104
Cite Article Cite Article

MLA

Divyabharathi D. N., and Nagaraj G. Cholli. "A Review on Identity and Access Management Server (KeyCloak)." IJSPPC vol.12, no.3 2020: pp.46-53. http://doi.org/10.4018/IJSPPC.2020070104

APA

Divyabharathi D. N. & Cholli, N. G. (2020). A Review on Identity and Access Management Server (KeyCloak). International Journal of Security and Privacy in Pervasive Computing (IJSPPC), 12(3), 46-53. http://doi.org/10.4018/IJSPPC.2020070104

Chicago

Divyabharathi D. N., and Nagaraj G. Cholli. "A Review on Identity and Access Management Server (KeyCloak)," International Journal of Security and Privacy in Pervasive Computing (IJSPPC) 12, no.3: 46-53. http://doi.org/10.4018/IJSPPC.2020070104

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

KeyCloak is an open source identity and access management arrangement focused on present day applications and administrations. It makes it simple to protect applications and administrations with next to zero code. The identity and access management server component provides centralized user management, authentication, and single sign-on identity brokering user federation, social login, client adapters, an admin console, and an account management console for the applications. With KeyCloak, the user management and authentication functions may be integrated with an externally managed system, such as LDAP or active directory. KeyCloak provides single sign-on infrastructure for authentication and session management. In this paper, the authors present an overview of KeyCloak that gives the objectives and features of KeyCloak and comparisons between the servers. They also present protocols of KeyCloak. Finally, benefits of KeyCloak are defined.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.