Securing Keycloak and Applications
In this chapter, we will look at how to secure Keycloak for production environments. Then, we will look at how to secure the database, as well as how to secure cluster communication between Keycloak nodes. Finally, we will touch on some topics regarding how you can protect your own applications against threats.
After reading this chapter, you will have a good understanding of how to securely deploy Keycloak, including what is required to secure the database. Since this is a book about Keycloak and not about application security, you won’t become an expert on application security, but if this is a topic that’s new to you, you will have a basic understanding and an idea of how to learn more.
In this chapter, we’re going to cover the following main topics:
- Securing Keycloak
- Securing the database
- Securing cluster communication
- Securing applications