Linux Ops Smart Journey
Linux Ops Smart Journey
Nov 3, 2025 · Cloud Native

How to Build a Production-Ready High-Availability Keycloak Cluster

Learn step‑by‑step how to design and deploy a production‑grade, high‑availability Keycloak cluster using external databases, distributed session management with Infinispan, HAProxy reverse proxy, TLS termination, and Docker‑Compose orchestration, ensuring scalability, fault tolerance, and secure identity management for cloud‑native applications.

DevOpsDocker ComposeHAProxy
0 likes · 8 min read
How to Build a Production-Ready High-Availability Keycloak Cluster
Linux Ops Smart Journey
Linux Ops Smart Journey
Oct 28, 2025 · Operations

Enable Keycloak SSO for Nightingale Monitoring with OAuth2/OIDC

This guide walks you through configuring Keycloak as an OAuth2/OIDC identity provider for Nightingale monitoring, covering prerequisites, client and user creation in Keycloak, Nightingale OIDC settings, and verification steps to achieve seamless single sign‑on in enterprise environments.

Identity ManagementKeycloakMonitoring
0 likes · 6 min read
Enable Keycloak SSO for Nightingale Monitoring with OAuth2/OIDC
Eric Tech Circle
Eric Tech Circle
Jun 30, 2024 · Information Security

Build Enterprise SSO Fast: Keycloak, SpringBoot, OAuth2 & JWT Guide

This article provides a comprehensive walkthrough of Single Sign‑On (SSO) concepts, common protocols, login flow diagrams, and multiple implementation options, then dives into step‑by‑step deployment of an enterprise‑grade SSO system using Keycloak with Docker or Kubernetes, including configuration, client setup, custom extensions, and practical code snippets.

AuthenticationDockerJWT
0 likes · 17 min read
Build Enterprise SSO Fast: Keycloak, SpringBoot, OAuth2 & JWT Guide
Programmer DD
Programmer DD
Feb 16, 2023 · Information Security

How to Install Keycloak and Seamlessly Integrate It with Spring Boot and Spring Cloud

This guide walks through downloading, installing, and initializing Keycloak, creating realms, clients, users and roles, then shows step‑by‑step integration with Spring Boot microservices, token propagation via Feign and Zuul, logout handling, email setup, third‑party login, and essential Keycloak terminology.

AuthorizationKeycloakOAuth2
0 likes · 17 min read
How to Install Keycloak and Seamlessly Integrate It with Spring Boot and Spring Cloud
Programmer DD
Programmer DD
Feb 15, 2022 · Information Security

Keycloak Deprecates Most Adapters – Impact on Spring Security and Boot

On February 14, the Keycloak team announced the deprecation of most adapters—including Spring Security and Spring Boot integrations—detailing which adapters will be discontinued, which will remain, and a timeline for the phase‑out, while noting the rise of Spring Authorization Server as a replacement.

KeycloakOIDCadapters
0 likes · 4 min read
Keycloak Deprecates Most Adapters – Impact on Spring Security and Boot
Programmer DD
Programmer DD
Sep 7, 2021 · Information Security

Understanding Keycloak Realms: Isolation, Management, and Best Practices

This article explains what a Keycloak Realm is, when to use it, the role of the built‑in Master Realm, how to create and manage additional Realms, and practical methods for setting up Realm‑specific admin accounts using both Master users and realm client users.

AuthenticationIdentity ManagementKeycloak
0 likes · 6 min read
Understanding Keycloak Realms: Isolation, Management, and Best Practices
Programmer DD
Programmer DD
Aug 29, 2021 · Backend Development

How to Programmatically Manage Keycloak Users with the Admin Client

Learn how to replace manual Keycloak UI operations with the Java Keycloak Admin Client, covering dependency setup, authentication via admin-cli, creating users in both master and custom realms, and leveraging service accounts, complete with code snippets and essential API references.

Admin APIJavaKeycloak
0 likes · 9 min read
How to Programmatically Manage Keycloak Users with the Admin Client
Programmer DD
Programmer DD
Aug 20, 2021 · Information Security

Keycloak + Spring Security: Unpacking the Filter Chain

This article examines how Keycloak integrates with Spring Security in a Spring Boot application, detailing the custom security filters added to the standard chain, the handling of authentication and authorization for the /admin/foo endpoint, and practical steps to enable detailed logging for deeper insight.

AuthenticationJavaKeycloak
0 likes · 8 min read
Keycloak + Spring Security: Unpacking the Filter Chain
Programmer DD
Programmer DD
Aug 7, 2021 · Information Security

Essential Keycloak Adapter Settings for Spring Security Integration

This article outlines the most commonly used Keycloak adapter configuration properties for Spring Security integration, explaining each setting such as realm, resource, auth-server-url, SSL requirements, CORS, bearer-only mode, and client credentials, and provides guidance on when and how to apply them.

AuthenticationAuthorizationConfiguration
0 likes · 6 min read
Essential Keycloak Adapter Settings for Spring Security Integration
Programmer DD
Programmer DD
Aug 7, 2021 · Information Security

How to Seamlessly Integrate Keycloak with Spring Security in Spring Boot

This tutorial explains step‑by‑step how to add Keycloak authentication to a Spring Boot application using the Spring Security adapter, covering Maven dependencies, configuration files, custom resolvers, role mapping, session strategies, and the typical authorization code flow.

AuthenticationJavaKeycloak
0 likes · 10 min read
How to Seamlessly Integrate Keycloak with Spring Security in Spring Boot
Programmer DD
Programmer DD
Jul 21, 2021 · Information Security

Why OIDC Extends OAuth2: Secure Authentication with Keycloak Explained

This article explains how OpenID Connect (OIDC) builds on OAuth 2.0 to provide authentication, demonstrates a practical Keycloak integration with a Spring Boot app, and walks through a complete authorization flow for a photo‑storage service using client credentials and secure token exchange.

AuthenticationAuthorizationKeycloak
0 likes · 8 min read
Why OIDC Extends OAuth2: Secure Authentication with Keycloak Explained
Programmer DD
Programmer DD
Jul 16, 2021 · Information Security

Secure Your Spring Boot App with Keycloak: Step‑by‑Step OIDC Integration

This guide walks you through creating a Keycloak realm, registering a client, defining roles and mappings, obtaining and refreshing JWT tokens, and configuring a Spring Boot application with the Keycloak Spring Boot starter to protect endpoints via OIDC authentication.

AuthenticationAuthorizationJava
0 likes · 8 min read
Secure Your Spring Boot App with Keycloak: Step‑by‑Step OIDC Integration
Programmer DD
Programmer DD
Jul 9, 2021 · Information Security

Hands‑On Keycloak: Install, Explore Realms & Users with Docker

This article walks you through installing Keycloak 14.0.0 via Docker, configuring the admin console, creating custom realms and users, and explains core concepts such as realms, authentication, authorization, roles, groups, clients, and identity providers for practical security integration.

AuthenticationAuthorizationDocker
0 likes · 8 min read
Hands‑On Keycloak: Install, Explore Realms & Users with Docker
Programmer DD
Programmer DD
Jul 8, 2021 · Information Security

Keycloak Explained: Powerful Open‑Source SSO Solution, Pros & Cons

Keycloak, Red Hat’s open‑source identity and access management platform, offers a comprehensive SSO solution with extensive protocols, admin UI, Spring Security integration, and customizable features, but its complexity and steep learning curve may pose challenges for smaller projects.

AuthenticationAuthorizationIdentity Management
0 likes · 7 min read
Keycloak Explained: Powerful Open‑Source SSO Solution, Pros & Cons