Introduction to Keycloak and the Need for Containerization

Identity Access Management or IAM as its name suggests is used to authenticate user identities and their privileges. You use this framework to check whether users have access to the resources that they need access to. Moreover, you can use it to identify users who have access to specific information and modify it according to your needs.

IAM is now a requirement for all modern software projects. Earlier, developers would need to create their own application specific user management infrastructures, but now with frameworks like Keycloak, this has become an easy task.

There are about three things that run in common with all IAM infrastructures:

They can create, manage, and delete identities without regard to access or entitlements.
They come with a function that allows their users to log on to use their services.
They rely on federated identity to authenticate users.