Learn how to protect your resources

Authenticate and authorise access to your resources with the right Identity and Access Management solution

Learn

Learn how to protect your resources with our blog and courses.

Use

Use our starter templates for your Identity and Access solutions.

Ask

Ask us when you need some more specific advise on your use case.

Latest posts

  • Understanding Passkeys and usage in IAM Solutions

    Understanding Passkeys and usage in IAM Solutions

    In the ever-evolving world of cybersecurity, traditional passwords are increasingly seen as a weak link. Enter passkeys — a modern, passwordless authentication method that’s gaining traction as a more secure and user-friendly alternative. But what exactly are passkeys, and how can they be integrated into IAM (Identity and Access Management) systems? Let’s break it down.…

    Read more

  • Connect Microsoft Entra ID with Keycloak

    Connect Microsoft Entra ID with Keycloak

    ​Integrating Microsoft Entra ID with Keycloak enables organizations to centralize authentication, enhance security, and implement role-based access control across multiple applications. This integration allows users to log in with their Microsoft credentials, with roles and group memberships mapped within Keycloak for precise authorization management.

    Read more

  • Authentication in a SPA with Keycloak

    Authentication in a SPA with Keycloak

    ​Integrating Keycloak with Single Page Applications (SPAs) enhances security by utilizing the OAuth 2.0 Authorization Code Flow with PKCE, eliminating the need to store client secrets in the frontend. This approach ensures secure user authentication and authorization, allowing SPAs to manage user sessions effectively while mitigating risks such as token interception.

    Read more

Simplify your
next project with IAM