Keycloak - Identity and Access Management for Modern Applications
by Stian Thorgersen, Pedro Igor Silva
Chapter 11: Authenticating Users
In the previous chapters, you learned how to manage users. You also walked through examples that involved users authenticating in Keycloak.
By now, you should be aware of how easy it is to set up Keycloak to promptly authenticate your users, but there is much more to authentication than just using a login page and asking users for passwords.
In this chapter, we are going to take a closer look at how authentication works, as well as the different authentication methods you can use to authenticate users. You will also be presented with more details about how password-based authentication works and how Keycloak can be used as a strong authentication system by leveraging two-factor authentication (2FA) and multi-factor ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Read now
Unlock full access