Need advice about which tool to choose?Ask the StackShare community!

Keycloak

604
1.2K
+ 1
94
Stormpath

38
94
+ 1
145
Add tool

Keycloak vs Stormpath: What are the differences?

Developers describe Keycloak as "An open source identity and access management solution". It is an Open Source Identity and Access Management For Modern Applications and Services. It adds authentication to applications and secure services with minimum fuss. No need to deal with storing users or authenticating users. It's all available out of the box. On the other hand, Stormpath is detailed as "User Management and Authentication for Developers". Stormpath is an authentication and user management service that helps development teams quickly and securely build web and mobile applications and services.

Keycloak and Stormpath can be primarily classified as "User Management and Authentication" tools.

Advice on Keycloak and Stormpath
Needs advice
on
KeycloakKeycloakOktaOkta
and
Spring SecuritySpring Security

I am working on building a platform in my company that will provide a single sign on to all of the internal products to the customer. To do that we need to build an Authorisation server to comply with the OIDC protocol. Earlier we had built the Auth server using the Spring Security OAuth project but since in Spring Security 5.x it is no longer supported we are planning to get over with it as well. Below are the 2 options that I was considering to replace the Spring Auth Server. 1. Keycloak 2. Okta 3. Auth0 Please advise which one to use.

See more
Replies (3)
Luca Ferrari
Solution Architect at Red Hat, Inc. · | 5 upvotes · 150.6K views
Recommends
on
KeycloakKeycloak

It isn't clear if beside the AuthZ requirement you had others, but given the scenario you described my suggestion would for you to go with Keycloak. First of all because you have already an onpremise IdP and with Keycloak you could maintain that setup (if privacy is a concern). Another important point is configuration and customization: I would assume with Spring OAuth you might have had some custom logic around authentication, this can be easily reconfigured in Keycloak by leveraging SPI (https://www.keycloak.org/docs/latest/server_development/index.html#_auth_spi). Finally AuthZ as a functionality is well developed, based on standard protocols and extensible on Keycloak (https://www.keycloak.org/docs/latest/authorization_services/)

See more
Sandor Racz
Recommends
on
KeycloakKeycloak

We have good experience using Keycloak for SSO with OIDC with our Spring Boot based applications. It's free, easy to install and configure, extensible - so I recommend it.

See more
Recommends
on
KeycloakKeycloak

You can also use Keycloak as an Identity Broker, which enables you to handle authentication on many different identity providers of your customers. With this setup, you are able to perform authorization tasks centralized.

See more
Get Advice from developers at your company using StackShare Enterprise. Sign up for StackShare Enterprise.
Learn More
Pros of Keycloak
Pros of Stormpath
  • 32
    It's a open source solution
  • 23
    Supports multiple identity provider
  • 15
    OpenID and SAML support
  • 10
    Easy customisation
  • 9
    JSON web token
  • 5
    Maintained by devs at Redhat
  • 28
    Authentication
  • 22
    User Management
  • 19
    API Authentication
  • 17
    Token Authentication
  • 17
    Security Workflows
  • 16
    Secure
  • 7
    Easy setup and great support
  • 7
    Great customer support
  • 6
    they manage the required, so I can focus on innovation
  • 3
    Private Deployment
  • 2
    Will sign BAA for HIPAA-compliance
  • 1
    Rapid Development
  • 0
    SAML Support

Sign up to add or upvote prosMake informed product decisions

Cons of Keycloak
Cons of Stormpath
  • 7
    Okta
  • 6
    Poor client side documentation
  • 5
    Lack of Code examples for client side
  • 4
    Discontinued

Sign up to add or upvote consMake informed product decisions

What is Keycloak?

It is an Open Source Identity and Access Management For Modern Applications and Services. It adds authentication to applications and secure services with minimum fuss. No need to deal with storing users or authenticating users. It's all available out of the box.

What is Stormpath?

Stormpath is an authentication and user management service that helps development teams quickly and securely build web and mobile applications and services.

Need advice about which tool to choose?Ask the StackShare community!

Jobs that mention Keycloak and Stormpath as a desired skillset
What companies use Keycloak?
What companies use Stormpath?
See which teams inside your own company are using Keycloak or Stormpath.
Sign up for StackShare EnterpriseLearn More

Sign up to get full access to all the companiesMake informed product decisions

What tools integrate with Keycloak?
What tools integrate with Stormpath?

Sign up to get full access to all the tool integrationsMake informed product decisions

What are some alternatives to Keycloak and Stormpath?
Auth0
A set of unified APIs and tools that instantly enables Single Sign On and user management to all your applications.
Okta
Connect all your apps in days, not months, with instant access to thousands of pre-built integrations - even add apps to the network yourself. Integrations are easy to set up, constantly monitored, proactively repaired and handle authentication and provisioning.
FreeIPA
FreeIPA is an integrated Identity and Authentication solution for Linux/UNIX networked environments. A FreeIPA server provides centralized authentication, authorization and account information by storing data about user, groups, hosts and other objects necessary to manage the security aspects of a network of computers.
Dex
Dex is a personal CRM that helps you build stronger relationships. Remember where you left off, keep in touch, and be more thoughtful -- all in one place.
Vault
Vault is a tool for securely accessing secrets. A secret is anything that you want to tightly control access to, such as API keys, passwords, certificates, and more. Vault provides a unified interface to any secret, while providing tight access control and recording a detailed audit log.
See all alternatives