Setting Up A Keycloak Server For Authenticating To FileMaker: Introduction
Lesson in Brief: What Is Keycloak, Why Use It & Next Steps
Data breaches are already far too common and the IT security industry is ever evolving to combat unauthorized access to systems. So, how can we as FileMaker developers and deployers embrace modern security practices? One way is to utilize an Identity and Access Management solution, such as Keycloak, and in this multi-part series we'll be looking at how to install, configure and connect Keycloak to authenticate users to a FileMaker database.