Login sovereignty with Keycloak

The topic of authentication is naturally sensitive and every company has to deal with it as part of its digitalization and software development. There are a large number of well-known providers of identity access management (IAM) solutions on the market. All major software providers such as Azure (Entra ID), Amazon (AWS Cognito), Google (Google Identity Platform), IBM (IBM Security Verify) and Oracle (Oracle Identity Management) offer their own IDaaS or IAM solutions. But what does this mean for the digital sovereignty of my company?

Ihre Probleme möchte er haben

Fabian Stein
Fabian beschäftigt sich mit der Digitalisierung in Deutschland und der Entwicklung des Open Source Marktes als CEO von punkt.de.
Reading duration: approx. 2 Minutes

US providers dominate the IDaaS and IAM market - Keycloak as a real alternative

It is easy to see that most providers are based in the USA and in many cases rely on their own cloud infrastructure. For any company that values its independence and is reluctant to rely on American companies for sensitive data such as login or password information, we can offer a real alternative with Keycloak.

Keycloak is open source and extremely flexible in terms of its functions and integration options. As a "Swiss army knife" in the IAM sector, Keycloak uses standard protocols (OpenID Connect, OAuth 2.0, SAML 2.0) and supports federation with common directory services such as LDAP or Active Directory (AD). Social login options are also available.

It is easy to see that most providers are based in the USA and in many cases rely on their own cloud infrastructure. For any company that values its independence and is reluctant to rely on American companies for sensitive data such as login or password information, we can offer a real alternative with Keycloak.

Keycloak is open source and extremely flexible in terms of its functions and integration options. As a "Swiss army knife" in the IAM sector, Keycloak uses standard protocols (OpenID Connect, OAuth 2.0, SAML 2.0) and supports federation with common directory services such as LDAP or Active Directory (AD). Social login options are also available.

Our CTO Daniel Lienert has already written a detailed article on Keycloak and its benefits:

Live true sovereignty as a company - prevent vendor lock-in!


Not only is the management of sensitive data often not in good hands with US companies, the classic vendor lock-in problem is also increasingly being recognized as such by companies. This should always be weighed up when deciding for or against a proprietary solution from a large provider. After a deep integration of the corresponding IAM solution, it is often too late and you are at the mercy of the providers and their pricing policy.

Keycloak takes a different approach here: the development of Keycloak is now the responsibility of the Cloud Native Computing Foundation (CNCF), which is part of the Linux Foundation. The CNCF is also known for projects such as Kubernetes. This guarantees that the project remains open source and can be operated in a platform-agnostic manner. (See also Charter, CNCF: https://github.com/cncf/foundation/blob/main/charter.md.) As a company, you decide where Keycloak is operated, where your data is located and who manages the application.

We at punkt.de have built up our own team of specialists who have already developed numerous IAM solutions and are happy to operate them for you. Whether in our infrastructure or your own is irrelevant to us. We will be happy to advise you.

Our conclusion for IAM solutions

If you are a company looking for a way to live sovereignty with regard to your data and software solution providers, then you have come to the right place. With Keycloak, we offer you an IAM solution that leaves nothing to be desired and gives you control. The code we develop also belongs to you in the end.

Share:

More articles

$success = $this -> getConnected();
Mihriban Dalmis, Entwicklung at punkt.de
Working at punkt.de