StackShareStackShare
Follow on
StackShare

Discover and share technology stacks from companies around the world.

Product

  • Stacks
  • Tools
  • Companies
  • Feed

Company

  • About
  • Blog
  • Contact

Legal

  • Privacy Policy
  • Terms of Service

© 2025 StackShare. All rights reserved.

API StatusChangelog
Keycloak
ByKeycloakKeycloak

Keycloak

#3in Authentication
Discussions7
Followers1.34k
OverviewDiscussions7

What is Keycloak?

It is an Open Source Identity and Access Management For Modern Applications and Services. It adds authentication to applications and secure services with minimum fuss. No need to deal with storing users or authenticating users. It's all available out of the box.

Keycloak is a tool in the Authentication category of a tech stack.

Keycloak Pros & Cons

Pros of Keycloak

  • ✓It's a open source solution
  • ✓Supports multiple identity provider
  • ✓OpenID and SAML support
  • ✓Easy customisation
  • ✓JSON web token
  • ✓Maintained by devs at Redhat

Cons of Keycloak

  • ✗Okta
  • ✗Poor client side documentation
  • ✗Lack of Code examples for client side

Keycloak Alternatives & Comparisons

What are some alternatives to Keycloak?

Auth0

Auth0

A set of unified APIs and tools that instantly enables Single Sign On and user management to all your applications.

JSON Web Token

JSON Web Token

JSON Web Token is an open standard that defines a compact and self-contained way for securely transmitting information between parties as a JSON object. This information can be verified and trusted because it is digitally signed.

OAuth2

OAuth2

It is an authorization framework that enables a third-party application to obtain limited access to an HTTP service, either on behalf of a resource owner by orchestrating an approval interaction between the resource owner and the HTTP service, or by allowing the third-party application to obtain access on its own behalf.

Amazon Cognito

Amazon Cognito

You can create unique identities for your users through a number of public login providers (Amazon, Facebook, and Google) and also support unauthenticated guests. You can save app data locally on users’ devices allowing your applications to work even when the devices are offline.

Spring Security

Spring Security

It is a framework that focuses on providing both authentication and authorization to Java applications. The real power of Spring Security is found in how easily it can be extended to meet custom requirements.

Firebase Authentication

Firebase Authentication

It provides backend services, easy-to-use SDKs, and ready-made UI libraries to authenticate users to your app. It supports authentication using passwords, phone numbers, popular federated identity providers like Google,

Keycloak Integrations

Authress, Otomi, KrakenD, Apicurio Studio, Beyond Identity and 5 more are some of the popular tools that integrate with Keycloak. Here's a list of all 10 tools that integrate with Keycloak.

Authress
Authress
Otomi
Otomi
KrakenD
KrakenD
Apicurio Studio
Apicurio Studio
Beyond Identity
Beyond Identity
Amazon OpenSearch Service
Amazon OpenSearch Service
CronApp
CronApp
pgrok
pgrok
React-admin
React-admin
Camunda
Camunda

Keycloak Discussions

Discover why developers choose Keycloak. Read real-world technical decisions and stack choices from the StackShare community.

Yossi Cohn
Yossi Cohn

Tech Lead

Sep 30, 2021

Needs adviceonAuth0Auth0KeycloakKeycloak

Looking for a SAML 2 Service Provider authentication flow. Considering Auth0 vs Keycloak for the Service Provider side any Pros and Cons to both ?

0 views0
Comments
Nilesh Ratta
Nilesh Ratta

Sep 7, 2021

Needs adviceonWildflyWildflyKeycloakKeycloak

I have an EAR deployed in a Wildfly instance. And it has many WAR folders. Is it possible to secure the whole EAR with Keycloak? And if I want to secure some of the WAR inside that EAR with Keycloak, is that possible?

0 views0
Comments
Nilesh Ratta
Nilesh Ratta

Aug 27, 2021

Needs adviceonKeycloakKeycloakOktaOkta

I want some good advice on which one I should prefer. (Keycloak or Okta) Since Keycloak is open source, it will be our first preference, but do we face some limitations with this approach? And since our product is SAAS based and we support the following authentications at present.

  1. AT DB level
  2. 3rd part IDP providers
  3. LDAP/AD...
0 views0
Comments
jmsalameh
jmsalameh

Jun 7, 2021

Needs adviceonKeycloakKeycloakFreeRADIUS FreeRADIUS

Hello all, I wanted to see if I could get some advice on how to integrate Keycloak with FreeRADIUS . I wanted our users to be able to use their Keycloak credentials to authenticate to our wifi through FreeRadius. I don't see much online for how the two can work together. I already have Keycloak setup and FreeRadius up and running. Now I need the two to talk to each other. Any help would be greatly appreciated.

0 views0
Comments
Joshua Dean Küpper
Joshua Dean Küpper

CEO at Scrayos UG (haftungsbeschränkt)

Feb 20, 2020

Needs adviceonOAuth2OAuth2KeycloakKeycloakQuarkusQuarkus

As the access to our global REST-API "Charon" is bound to OAuth2, we use Keycloak inside Quarkus to authenticate and authorize users of our API. It is not possible to perform any un-authenticated requests against this API, so we wanted to make really sure that the authentication/authorization component is absolutely reliable and tested. We found those attributes within Keycloak, so we used it.

0 views0
Comments

Try It

Visit Website

Adoption

On StackShare

Companies
175
COMRED+169
Developers
588
RJMPAR+582