When running Keycloak it can be useful to log events like a login or logout event using the jboss-logging
event listener. This is a built-in event listener that will use JBoss logging to log events. For example we can configure our JBoss logging to log to the standard output streams and when we run Keycloak we can see in the console output details about events when they happen. The event listener jboss-logging
is enabled by default for a realm. We can check it from the Events Config page where it is listed in the Event Listeners field.
Continue reading →
These days companies gather and manage vast amounts of user data.
Loss of this data will expose companies to financial/legal liabilities or damages to their brand.
This is because over the last years, governments have introduced new regulations like the General Data Protection Regulation (GDPR).
Because of this, security is a major cross-cutting concern for application architecture.
This two-part blog post explains how you can leverage Keycloak to secure your Spring microservices.
The first blog will focus on how to install and configure Keycloak.
The second blog will show how to use Keycloak to secure your Spring Boot microservices.
Keycloak is a modern open source Identity and Access Management solution.
It enables us to secure all sorts of frontend applications (apps) / services and offers the following features:
A corporate version, known as Red Hat Single Sign-On (SSO), is also available from (and supported by) Redhat.
The support and the ability to connect to existing identity systems make it a good fit for large organisations.
Continue reading →