Identity-First Security: Why Keycloak is the Heart of Your NIS-2 Strategy
In 2026, the threat landscape for European SMEs is more precarious than ever. Identity theft has …

TL;DR
Identity is the new perimeter. Outsourcing login and user management to SaaS services like Auth0 or AWS Cognito initially offers convenience but leads to a double trap: exponentially increasing costs with growing user numbers (pay-per-MAU) and limited customizability. Keycloak is the industry standard to regain this sovereignty. It offers a complete, open-source-based IAM solution that scales indefinitely, connects with any existing directory (AD/LDAP), and does not charge a ’tax’ per active user.
SaaS solutions often want to be the only database for your users. In reality, identities are everywhere: in the company’s Active Directory, in social media accounts (Google/GitHub), or in partner databases.
Keycloak acts as an Identity Broker.
What happens if you need a login flow that is not standard? For example: “After the password, the user must accept terms and conditions, but only if they are from Germany, and then receive an SMS via a local provider.”
With AWS Cognito, you hit hard limits (limited Lambda triggers).
Keycloak offers Service Provider Interfaces (SPI).
Since Keycloak is based on Java, you can write your own plugins for almost any component (authentication, user storage, protocols). You can extend the core logic of the server without forking the source code. This makes Keycloak the most flexible IAM solution on the market.
The business model of Auth0 and Okta is based on Monthly Active Users (MAU).
For a B2B startup with 500 users, this is affordable. For a B2C platform or a shop with 1 million occasional users, this model becomes ruinous. Costs explode linearly with success.
Keycloak does not know MAUs.
Whether you manage 100 or 1,000,000 users, it does not change the license (since it is open source). You only pay for the infrastructure (CPU/RAM) in the cluster. Since login processes are very efficient, you can manage millions of users on modest hardware. The marginal costs per user approach zero.
Here it is decided whether your IAM is a cost driver or a strategic asset.
Scenario A: Auth0 / AWS Cognito (The Golden Cage)
The entry point (“Time to Hello World”) is extremely fast, but the lock-in is deep.
Scenario B: Keycloak with Managed Kubernetes by ayedo
In the ayedo App Catalog, Keycloak is the IAM engine for professionals.
| Aspect | Auth0 / AWS Cognito (SaaS) | ayedo (Managed Keycloak) |
|---|---|---|
| Cost Model | Pay-per-User (MAU) (Expensive!) | Infrastructure (Flat rate) |
| Data Sovereignty | Provider (Difficult data export) | Complete (Own DB) |
| Extensibility | Limited (Webhooks/Triggers) | Unlimited (Java SPI) |
| Protocols | OIDC / SAML | OIDC, SAML, Docker Auth, Kerberos |
| User Federation | Usually additional costs / connectors | Native (LDAP/AD/Kerberos) |
| Strategic Risk | Extreme Lock-in | Full Sovereignty |
Keycloak vs. Authentik: What is the difference?
Both are top tools in the ayedo catalog. Keycloak (Java) is the established “enterprise tanker.” It has more features for legacy integrations (Kerberos, User Federation) and is the standard in corporations. Authentik (Python/Go) is more modern, lighter, and often more intuitive to configure (“Flows”).
Rule of thumb: Do you need deep LDAP integration, SPI extensions, or certification? Choose Keycloak. Do you want a modern, fast solution for Kubernetes apps? Check out Authentik.
Is Keycloak difficult to operate?
Historically: Yes. Java applications with Infinispan clustering are complex to tune. This is exactly the value of Managed Keycloak at ayedo. We deliver a pre-configured, Kubernetes-optimized instance (based on the modern Quarkus distribution) that starts quickly and runs stably without you having to be a Java expert.
Can I use my existing Active Directory users?
Yes, this is Keycloak’s showcase discipline. With “User Federation,” you can connect your AD or LDAP. Keycloak does not necessarily synchronize users but can directly verify passwords against the AD. This enables a seamless transition from on-premise to cloud.
Does Keycloak support social login?
Yes. Google, Facebook, GitHub, Microsoft, LinkedIn – almost every relevant provider is supported out-of-the-box. You only need the client IDs of the respective service.
Identity is too important to rent. Those who rely on SaaS IAM exchange short-term convenience for long-term dependency and high costs. Keycloak is the answer for companies that want to grow without being penalized “per user.” It is powerful, sovereign, and the global standard for open-source IAM. With the ayedo Managed Stack, you get this enterprise power without the operational pain of Java management – scalable, secure, and under your control.
In 2026, the threat landscape for European SMEs is more precarious than ever. Identity theft has …
Why the Open-Source Technology is More Than Just Container Orchestration When digital sovereignty …
🧠 Editorial If you’ve noticed: The Weekly Backlog looks a bit different. Now even more …