Chapter 11: Authenticating Users
In the previous chapters, you learned how to manage users. You also walked through examples that involved users authenticating in Keycloak.
By now, you should be aware of how easy it is to set up Keycloak to promptly authenticate your users, but there is much more to authentication than just using a login page and asking users for passwords.
In this chapter, we are going to take a closer look at how authentication works, as well as the different authentication methods you can use to authenticate users. You will also be presented with more details about how password-based authentication works and how Keycloak can be used as a strong authentication system by leveraging two-factor authentication (2FA) and multi-factor authentication (MFA). For that, you will learn about the different types of credentials you can choose from to authenticate users and how they work together to increase the overall security of your system.
In this chapter, we will...