Learn how to connect IBM Cloud App ID to your Red Hat SSO or Keycloak instance.
Setting up application security can be complicated. For most developers, it can be one of the hardest parts of creating an app. How can you be sure that you are securely storing your users’ information? How can you be sure your system cannot be infiltrated? How do you manage access controls? How do you ensure that you address any and all vulnerabilities? What if your application runs on different cloud providers with completely different security systems?
In most cases, developers prefer to focus on delivering the business value while leaving any security aspects to experts and specialized products. There are quite a few well-known and trusted Identity and Access Management products on the market that you might already be familiar with, but today I’m going to focus on two of them: IBM Cloud App ID and Red Hat SSO (which is based on the open source Keycloak project).
What’s the difference between App ID and Red Hat SSO?
Now, before I dive into technical details, let’s try to understand what those two products are. Enterprises have traditionally deployed IAM software products to manage identity and access. Red Hat SSO is a software package that enterprises can manage and deploy on their own. Increasingly, developers and enterprises want to consume identity and access as-a-service. App ID is offered as-a-service and specifically targets developers who don’t need (or want) to know anything about security protocols. The service allows for them to consume all of the security capabilities while the operational aspects are handled by the IBM Cloud Platform.
Configuring App ID to use an existing Red Hat SSO or Keycloak instance
So, the question that brought you to this blog: What if I already have an existing Red Hat SSO or Keycloak instance that handles user authentication but I still want all of the benefits that come from the integrated IBM Cloud experience?
The short answer—no problem! You can connect IBM Cloud App ID to your Red Hat SSO or Keycloak instance.
Check out the following video tutorial and instructions to learn how to maximize the benefits of both options with zero code changes or redeploys.