Summary
In this chapter, you learned how to integrate Keycloak with different types of applications, depending on the technology stack they are using, as well as the platform they are running. You also learned about the importance of using well-known and established open standards and what that means in terms of interoperability. This means you are free to choose the OpenID Connect client implementation that best serves your needs, while still respecting compliance and keeping your applications up to date with the OAuth2 and OpenID Connect best practices and security fixes.
Finally, you learned why you should avoid implementing your own integration, as well as the things you should consider when you’re looking for alternatives if none of the other options work for you.
In the next chapter, you will learn about the different authorization strategies you can use to protect your application resources.