1. User Management Lifecycle
with Keycloak
1
Muhammad Edwin
Red Hat Global Professional Services
Prepared for JVM Meetup #46
2. 2
This presentation is intended for educational purposes only and does not
replace independent professional judgement.
Statements are my own, and not reflect opinion or position of
redhat.com.
Disclaimer
Legal Stuffs
4. Who Am I ?
Intro
Middleware and Application Development Consultant
at Red Hat.
github.com/edwin
linkedin.com/in/muhammadedwin
edwin at redhat dot com
telegram : @JVMUserGroup or pm to @edwinkun
4
20. What is Authorization
Authentication Authorization
Who are you? Can you do this?
● Login Screen
● Fingerprint
● OTP
● Certificate
● ACL (Access Control List)
● Secure URL
● Access Right
● Privilege Access Management
● Role Management
20
Lifecycle