Writing Code in Dim Office

How to Setup Apache Superset with Keycloak

Reading Time: 2 minutes In this blog, we will learn to deploy & set up Apache Superset with Keycloak authentication. Apache Superset is an open-source software application for data exploration and data visualization able to handle data at a petabyte scale. Keycloak is an open-source software product to allow single sign-on with Identity and Access Management aimed at modern applications and services. Prerequisites Keycloak server Keycloak Realm Keycloak Client Continue Reading

keycloak on kubernetes with postgres

How to deploy Keycloak with Postgres on GKE

Reading Time: 3 minutes In this blog, we will se how we can deploy Keycloak with Postgres database on kubernetes here, Postgres database is to persist keycloak data. Without Postgres Keycloak will use it’s internal embedded databse H2. Keycloak is an open-source Identity and Access management application. It can be used for authentication applications and it has many providers like google to provide sign-in from your google account. It Continue Reading


Migrate Keycloak H2 database to Postgres on Kubernetes

Reading Time: 4 minutes In this blog. We will discuss how we can migrate the Keycloak H2 database to Postgres on production or for the new server. Follow stepwise instructions to migrate the Keycloak H2 database to Postgres. Introduction – Migrate Keycloak Keycloak: is open source identity & access management software. It provides many services for authentication and security. H2 database: H2 database in-memory java-based relational database for keycloak. Continue Reading

Introduction to Keycloak

Reading Time: 3 minutes Hey champs, let us try to understand about keycloak services, benefits and their feature etc. Add authentication to applications and secure services with minimum fuss. No need to deal with storing users or authenticating users. It’s all available out of the box. You’ll even get advanced features such as User Federation, Identity Brokering and Social Login. IAM(Identity Access Management) IAM or IdM(Identity Management) is a Continue Reading