Service package
Keycloak

Starter Keycloak consulting package

An ideal service format for those with limited experience and knowledge of Keycloak. As part of finding the best solution for you, we’ll guide you through the basics of Keycloak, how to use it effectively, and the advantages it offers as an IAM solution.Plus, we’ll help you determine if Keycloak is the right fit for your specific needs.

Importnant condition

Keycloak must already be installed and accessible, and the client should have admin access.

Included

Session customization according to your specific needs.
Multiple team members welcome.
  • A one-day, expert-led session for your team.
  • Kickoff meeting to align goals, review your environment, and assess configurations.
  • Overview of core concepts, features, and the admin console.
  • Guided realm setup, user permissions, and authentication flows.
  • Best practices on securing Keycloak, monitoring, and regular upkeep.
  • Tips for login themes and external identity integrations.

Full package description

Kickoff meeting

We meet with you to formulate, discuss, and align on the consultation goals. With your input, we gather information about your current environment, user management needs, and usage scenarios

Environment assessment and review

Our goal at this stage is to review your existing Keycloak setup. We assess configurations, realms, clients, users, and roles, as well as identify any potential issues or areas for improvement.

Keycloak fundamentals overview

We introduce you to Keycloak’s core concepts and business objects, such as realms, clients, roles, groups, and users. It also includes a tour of Keycloak's admin console, with us explaining each key section.

Core features overview

At this stage, we help you understand the key features of Keycloack like user federation, Authentication flows, MFA, Client roles, user roles, and permissions management.

Configuration workshop

We conduct a personalized workshop to assist you in configuring a simple realm with a few clients (applications). From our side, we demonstrate setting up roles, groups, and user permissions, as well as walk you through creating authentication flows (e.g., enabling MFA, self-registration).

Security and maintenance overview

It’s one of the most important stages of the package which involves discussing how to secure Keycloak, including SSL/TLS, securing endpoints, and regular backups. We also provide you with the valuable information on the monitoring of Keycloak for performance and security, and together explore the best practices for ongoing maintenance, including regular updates and patching.

Customizing and extending Keycloak

With us, you will learn how to customize login themes and pages, and integrate with external identity providers (e.g., Google and social logins).

What deliverables you will get

Environment review report

A concise document outlining the current setup, identified issues, and recommended improvements.

Further recommendations

Represent suggestions for ongoing management and additional training or resources.

Do you want to turn your business idea into a flawless and durable solution?

Drop us a message, and we will find the right way to fulfill your ambitious plan.

You will talk to our leadership
Andrei Zhukouski
Andrei Zhukouski
Chief Strategy Officer
Kanstantsin Miranovich
Kanstantsin Miranovich
Co-Founder / CTO
Live us a message
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

Functional advantages of connecting your system with Keycloak

Multi-factor authentication and WebAuthn support
Multi-factor authentication and WebAuthn support
Standard protocols (OpenID Connect, OAuth 2.0, SAML 2.0)
Standard protocols (OpenID Connect, OAuth 2.0, SAML 2.0)
Central administration
Central administration
Federation (Active Directory, Social Login, LDAP, other IAM Systems)
Federation (Active Directory, Social Login, LDAP, other IAM Systems)
Rloud-Native (Docker / Kubernetes)
Rloud-Native (Docker / Kubernetes)
High performance
High performance
Cluster operation
Cluster operation
Expandability
Expandability