Category: Security

Many of us have encountered the word auth while building our applications. When it comes to understanding auth, it can briefly be categorized into three — don’t understand auth, trying to understand auth, think they understand auth.

Roles are imported in Keycloak as user attributes, which means it is hard to change the scope of clients in Keycloak.

And to top it all, with hundreds of redirects happening in between Keycloak, SFCC and the sytem, there is an unacceptable delay in response.

We proposed to use Keycloak as an IDP for both API and Portal, and SFCC as CRM( customer relationship management).

Related Articles