reyemb

Why I have choosen Keycloak

Mon Sep 08 2025

For projects that need SSO, OAuth2/OIDC, and flexible identity flows, I chose Keycloak. It’s open source, standards-based, and production-tested.

Reasons that mattered:

Operationally, Keycloak integrates well with reverse proxies and supports modern deployment targets (containers, Kubernetes). It’s a solid default for teams who want control without reinventing auth.

Quick start

Run a local Keycloak with Docker:

docker run -p 8080:8080 \
  -e KEYCLOAK_ADMIN=admin -e KEYCLOAK_ADMIN_PASSWORD=admin \
  quay.io/keycloak/keycloak:latest start-dev

Example client config

{
  "realm": "my-realm",
  "auth-server-url": "http://localhost:8080",
  "ssl-required": "none",
  "resource": "my-client",
  "public-client": true,
  "confidential-port": 0
}

Use mappers to include custom claims in tokens and keep services stateless.