Azure Entra ID vs. Keycloak
Identity as a Service or as Infrastructure Azure Entra ID and Keycloak address the same core issue: …
Diese Serie erklärt systematisch, wie moderne Software compliant entwickelt und betrieben wird – von EU-Regulierungen bis zur technischen Umsetzung.
Anyone responsible for a digital organization today knows: The major European regulatory frameworks—GDPR, NIS-2, DORA—do not target individual tools but structured security and risk management. Access to systems and data is at the center.
On May 25, 2018, the GDPR came into force, redefining the protection of personal data in Europe. On January 16, 2023, the NIS-2 Directive (EU) 2022/2555 became effective, which must be transposed into national law by October 17, 2024, and then particularly obliges critical and important entities. Also on January 16, 2023, the DORA Regulation (EU) 2022/2554 came into force; it applies from January 17, 2025, binding for financial companies and essential service providers in the financial sector.
All these regulations share a common theme: Without control over access, no reliable compliance can be demonstrated.
Identity & Access Management (IAM) is therefore not a peripheral issue but the technical manifestation of governance decisions:
Keycloak addresses this core directly—offering an open, well-integrated IAM solution that seamlessly fits into modern platforms and particularly into Kubernetes-based environments.
Keycloak is an open-source IAM project that has been used productively in large organizations for years. The focus is on Single Sign-On (SSO), access control, and centralized user management across applications and infrastructure levels.
Keycloak supports common standards:
This allows different applications—from modern microservices to established line-of-business systems—to connect to a central IAM without maintaining special protocols.
Some core concepts are particularly important from a compliance perspective:
In sum, a consistent picture emerges: Identities, roles, and policies are centrally defined and carried into the system landscape through protocol standards.
The GDPR requires in Article 32 “appropriate technical and organizational measures” to ensure a level of security appropriate to the risk. Explicitly mentioned are:
IAM is a central component here: Without reliable control over who has access to personal data, confidentiality cannot be demonstrated. Keycloak directly supports:
Thus, Keycloak becomes an important element of a GDPR-oriented security architecture—even though it is, of course, only part of the overall picture.
NIS-2 addresses the security of network and information systems, particularly in critical and important sectors (energy, health, transport, digital infrastructure, etc.). It requires:
Keycloak contributes mainly to two focal points:
For organizations subject to NIS-2, a central IAM layer offers a clear advantage: Security measures do not need to be implemented individually in each system but are defined in Keycloak and consistently rolled out.
The DORA regulation targets digital operational resilience in the financial sector and critical ICT service providers. From January 17, 2025, DORA requires:
Keycloak supports DORA requirements in two dimensions:
Especially for regulated financial companies, a unified IAM layer is a crucial lever to integrate the multitude of systems into a consistent, auditable security architecture.
Keycloak offers:
For GDPR Article 32, MFA is a classic example of an “appropriate technical measure.” NIS-2 explicitly requires multi-factor authentication for critical accesses. DORA expects robust mechanisms, especially for privileged accounts.
By centralizing in Keycloak, MFA policies do not need to be implemented per application. Instead, the policy is defined once in the IAM and becomes effective for all connected systems.
Keycloak enables role-based authorization both at the realm and client levels. Typical patterns:
In the context of NIS-2 and DORA, this is essential:
The principle of least privilege can be concretely implemented, documented, and regularly reviewed. Recertification processes can build on the roles maintained in Keycloak.
Keycloak provides detailed logging:
For GDPR, NIS-2, and DORA, the ability to reconstruct security-relevant processes is central. Keycloak provides the IAM-side data foundation on which further monitoring and reporting processes can build.
The Kubernetes-API is the nerve center of modern platforms—access is correspondingly critical. In many organizations, there is historically a mix of static certificates, service accounts, and local users at the cluster level.
With Keycloak as the central identity provider for Kubernetes, the following goals can be achieved:
From an audit perspective, it is particularly valuable: Accesses to Kubernetes are directly linked to a centrally managed identity and not to anonymous certificates.
In practice, there are often many admin interfaces and portals: Git servers, CI/CD pipelines, monitoring tools, cloud provider consoles, internal admin UIs. If each solution brings its own MFA logic or lacks it altogether, a heterogeneous and hard-to-audit security situation arises.
Keycloak allows:
Thus, MFA does not become a patchwork but a clearly managed part of the security architecture—in line with regulatory requirements.
A common break in practice:
On the application level, well-thought-out role models exist, while on the infrastructure and management level, historically grown “admin” accounts without clear differentiation prevail.
Keycloak enables consistent thinking of role models:
Identity as a Service or as Infrastructure Azure Entra ID and Keycloak address the same core issue: …
TL;DR Starting point is a multi-tenant Django SaaS application, which is taken from the first line …
TL;DR Multi-Tenant deployments consolidate many customers in a shared environment with logical …