Skip to Content
Keycloak - Identity and Access Management for Modern Applications
book

Keycloak - Identity and Access Management for Modern Applications

by Stian Thorgersen, Pedro Igor Silva
June 2021
Beginner to intermediate
362 pages
7h 52m
English
Packt Publishing
Content preview from Keycloak - Identity and Access Management for Modern Applications

Chapter 8: Authorization Strategies

In the previous chapter, you learned about the options for integrating with Keycloak using different programming languages, frameworks, and libraries. You learned how to obtain tokens from Keycloak and use these tokens to authenticate users.

This chapter will focus on the different authorization strategies you can choose from and how to leverage them to enable authorization to your applications using different access control mechanisms such as role-based access control (RBAC), group-based access control (GBAC), OAuth2 scopes, and attribute-based access control (ABAC), as well as learning how to leverage Keycloak as a centralized authorization server to externalize authorization from your applications. You ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Keycloak - Identity and Access Management for Modern Applications - Second Edition

Keycloak - Identity and Access Management for Modern Applications - Second Edition

Stian Thorgersen, Pedro Igor Silva
Mastering API Architecture

Mastering API Architecture

James Gough, Daniel Bryant, Matthew Auburn

Publisher Resources

ISBN: 9781800562493Supplemental Content