<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	
	xmlns:georss="http://www.georss.org/georss"
	xmlns:geo="http://www.w3.org/2003/01/geo/wgs84_pos#"
	>

<channel>
	<title>DIT - Inero Software - Software Consulting</title>
	<atom:link href="https://inero-software.com/tag/dit/feed/" rel="self" type="application/rss+xml" />
	<link>https://inero-software.com/tag/dit/</link>
	<description>We unleash innovations using cutting-edge technologies, modern design and AI</description>
	<lastBuildDate>Wed, 06 Nov 2024 07:28:12 +0000</lastBuildDate>
	<language>en-GB</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.1</generator>

<image>
	<url>https://inero-software.com/wp-content/uploads/2018/11/inero-logo-favicon.png</url>
	<title>DIT - Inero Software - Software Consulting</title>
	<link>https://inero-software.com/tag/dit/</link>
	<width>32</width>
	<height>32</height>
</image> 
<site xmlns="com-wordpress:feed-additions:1">153509928</site>	<item>
		<title>Exporting accounts to federated realms: A guide to Keycloak and LDAP Integration</title>
		<link>https://inero-software.com/exporting-accounts-to-federated-realms/</link>
		
		<dc:creator><![CDATA[Marceli Formela]]></dc:creator>
		<pubDate>Fri, 26 Jul 2024 08:27:48 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[Company]]></category>
		<category><![CDATA[Keycloak]]></category>
		<category><![CDATA[Directory Information Tree]]></category>
		<category><![CDATA[DIT]]></category>
		<category><![CDATA[features]]></category>
		<category><![CDATA[identity provider]]></category>
		<category><![CDATA[keycloak]]></category>
		<category><![CDATA[LDAP]]></category>
		<category><![CDATA[Lightweight Directory Access Protocol]]></category>
		<category><![CDATA[Protocol variations]]></category>
		<guid isPermaLink="false">https://inero-software.com/?p=6022</guid>

					<description><![CDATA[<p>Artykuł <a href="https://inero-software.com/exporting-accounts-to-federated-realms/">Exporting accounts to federated realms: A guide to Keycloak and LDAP Integration</a> pochodzi z serwisu <a href="https://inero-software.com">Inero Software - Software Consulting</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<div class="row"><div class="col-sm-1"></div><div class="col-sm-10">
<h4></h4>
<h4><strong>We know from the previous posts that Keycloak as an identity provider gives us a platform for managing user identities, securing applications, and integrating with different providers. Therefore, one powerful feature of Keycloak is its ability to integrate with Lightweight Directory Access Protocol (LDAP) directories. This article provides a quick guide for account export to federated realms through migrating users with their credentials and importing groups by custom mappers.</strong></h4>
<p>&nbsp;</p>
<h3><b>Understanding directory services</b></h3>
<p><span style="font-weight: 400;">A directory service is built to manage and store data in a format of key-value pairs. This structure is optimized for read-heavy operations, making it particularly well-suited for information that is frequently accessed but infrequently updated. The data within such a directory is often descriptive, serving to detail various attributes of entities.</span></p>
<p><span style="font-weight: 400;">For example, imagine using a directory service to manage an address book. Each entry in this address book represents an individual person, with key-value pairs capturing their contact details, place of employment, and other relevant information. This method of data organization is especially beneficial when dealing with qualitative and descriptive information that needs to be easily retrievable.</span></p>
<p><span style="font-weight: 400;">LDAP operates using a hierarchical directory structure, which enables it to store and access data efficiently. This protocol is widely used to keep track of organizational details, including information about users, assets, and various entities. Its hierarchical model supports a flexible approach to defining and managing these entities and their attributes, ensuring that the directory service remains adaptable to different organizational needs and scalable as data grows.</span></p>
<h3><b>Key features of LDAP</b></h3>
<ul>
<li style="font-weight: 400;" aria-level="1"><b>Standardized Protocol</b><span style="font-weight: 400;">: LDAP is a widely recognized protocol supported by numerous directory services, including Microsoft Active Directory, OpenLDAP, and Apache Directory Server.</span></li>
<li style="font-weight: 400;" aria-level="1"><b>Hierarchical Structure</b><span style="font-weight: 400;">: LDAP directories are structured hierarchically, similar to a tree, facilitating the efficient organization and retrieval of information.</span></li>
<li style="font-weight: 400;" aria-level="1"><b>Scalability</b><span style="font-weight: 400;">: LDAP is optimized to manage a high volume of read and search operations efficiently, making it ideal for large-scale enterprise environments with extensive user bases.</span></li>
</ul>
<p>&nbsp;</p>
<h3><b>LDAP architecture</b></h3>
<p><span style="font-weight: 400;">Understanding the architecture of LDAP is crucial for maximizing its utility. The primary components include:</span></p>
<p>&nbsp;</p>
<h4><b>Directory Information Tree (DIT)</b></h4>
<p><span style="font-weight: 400;">The directory&#8217;s hierarchical structure consists of entries, each representing an object like a user, group, or device, and uniquely identified by a Distinguished Name (DN). The DIT is organized hierarchically, with the root of the tree at the top. Below the root are various levels of nodes, each representing different types of entities such as organizations, departments, and individual users. This hierarchical setup allows for an efficient and logical way of managing and accessing directory data.</span></p>
<h4><b>Attributes / Entries</b></h4>
<p><span style="font-weight: 400;">Attributes are grouped within entities called objectClasses, which are collections of related attributes useful for describing specific entities. When creating an entry, you can utilize the attributes defined by an objectClass by assigning the desired objectClass to the entry. In fact, the objectClass attribute is the only attribute you can set without specifying further objectClasses.</span></p>
<p><span style="font-weight: 400;">For instance, when creating an entry to represent a person, including the objectClass—or any derived objectClasses—enables the use of all the attributes associated with that specific objectClass. In such an entry, you might set attributes like cn for the common name, description for a brief overview of the entry, and sn for the surname.</span></p>
<h4><b>Schema</b></h4>
<p><span style="font-weight: 400;">Attribute and object classes are grouped together as something we call a schema. This mechanism takes care of consistency and integrity in the directory tree we use. Unlike relational databases, these schemas are simply collections of related objects and attributes. A single Directory Information Tree (DIT) can utilize multiple schemas to create the necessary entries and attributes.</span></p>
<p><span style="font-weight: 400;">Schemas typically include extra attribute specifications and may require attributes outlined in other schemas. For instance, the person objectClass requires the inclusion of the surname (sn) attribute for any related entries. In cases where these attributes are absent from the LDAP server, a schema including these definitions can be integrated into the server’s tree structure.</span></p>
<p>&nbsp;</p>
<h2><b>Protocol variations</b></h2>
<p><span style="font-weight: 400;">LDAP is essentially a protocol that defines a communication interface for working with directory services, often referred to as LDAP or ldap. There are several variants of the LDAP protocol format worth noting:</span></p>
<ul>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">ldaps://: This variation stands for LDAP secured by SSL/TLS. Although standard LDAP traffic is unencrypted, most LDAP implementations support encryption. However, using SSL/TLS for LDAP encryption is deprecated, and the recommended way to secure LDAP connections is STARTTLS.</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">ldap://: This is a standard LDAP protocol that provides structured access to a directory service.</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">ldapi://: This variation stands for LDAP over IPC (Inter-Process Communication). Typically used for secure local connections to an LDAP system for administrative purposes, for example using internal sockets.</span></li>
</ul>
<p><span style="font-weight: 400;">While all three formats use the LDAP protocol, the two of them provide just additional context on the method of communication.</span></p>
<p>&nbsp;</p>
<h3><b>Returning to the realm and configuring LDAP</b></h3>
<p>After familiarizing yourself with the theory of LDAP operation, we can return to the realm, whose configuration we mentioned in the previous post (<a href="https://inero-software.com/enhancing-identity-management-with-keycloak-user-federations/">you can find it here</a>), and go to the User Federation tab, where we can enter the necessary data to connect to the LDAP server provided by the sample provider.</p>
<p><img fetchpriority="high" decoding="async" data-attachment-id="6023" data-permalink="https://inero-software.com/exporting-accounts-to-federated-realms/4-6/" data-orig-file="https://inero-software.com/wp-content/uploads/2024/07/4.jpg" data-orig-size="1920,1080" data-comments-opened="0" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}" data-image-title="4" data-image-description="" data-image-caption="" data-medium-file="https://inero-software.com/wp-content/uploads/2024/07/4-300x169.jpg" data-large-file="https://inero-software.com/wp-content/uploads/2024/07/4-1030x579.jpg" tabindex="0" role="button" class="wp-image-6023 aligncenter" src="https://inero-software.com/wp-content/uploads/2024/07/4.jpg" alt="" width="714" height="402" srcset="https://inero-software.com/wp-content/uploads/2024/07/4.jpg 1920w, https://inero-software.com/wp-content/uploads/2024/07/4-300x169.jpg 300w, https://inero-software.com/wp-content/uploads/2024/07/4-1030x579.jpg 1030w, https://inero-software.com/wp-content/uploads/2024/07/4-768x432.jpg 768w, https://inero-software.com/wp-content/uploads/2024/07/4-1536x864.jpg 1536w, https://inero-software.com/wp-content/uploads/2024/07/4-533x300.jpg 533w" sizes="(max-width: 714px) 100vw, 714px" /></p>
<p><span style="font-weight: 400;">The essential information we need includes the connection URL, the distinguished name of the LDAP admin (bind DN), and the distinguished name of the users (users DN), which is the parent of all users in the LDAP tree. Most attributes, such as the LDAP username, LDAP UUID, or user object classes, can be left at their default values as they align with our LDAP server provider requirements.</span></p>
<p><img decoding="async" data-attachment-id="6024" data-permalink="https://inero-software.com/exporting-accounts-to-federated-realms/7-2/" data-orig-file="https://inero-software.com/wp-content/uploads/2024/07/7.jpg" data-orig-size="1920,710" data-comments-opened="0" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}" data-image-title="7" data-image-description="" data-image-caption="" data-medium-file="https://inero-software.com/wp-content/uploads/2024/07/7-300x111.jpg" data-large-file="https://inero-software.com/wp-content/uploads/2024/07/7-1030x381.jpg" tabindex="0" role="button" class="wp-image-6024 aligncenter" src="https://inero-software.com/wp-content/uploads/2024/07/7.jpg" alt="" width="715" height="264" srcset="https://inero-software.com/wp-content/uploads/2024/07/7.jpg 1920w, https://inero-software.com/wp-content/uploads/2024/07/7-300x111.jpg 300w, https://inero-software.com/wp-content/uploads/2024/07/7-1030x381.jpg 1030w, https://inero-software.com/wp-content/uploads/2024/07/7-768x284.jpg 768w, https://inero-software.com/wp-content/uploads/2024/07/7-1536x568.jpg 1536w, https://inero-software.com/wp-content/uploads/2024/07/7-811x300.jpg 811w" sizes="(max-width: 715px) 100vw, 715px" /></p>
<p><span style="font-weight: 400;">After synchronizing users, we see that two new entries have appeared in the </span><b>Users</b><span style="font-weight: 400;"> tab. Synchronization with LDAP offers more possibilities than just simple user account import. Let&#8217;s check out how mappers work.</span></p>
<h4><b>Example 1: hardcoded-attribute-mapper</b></h4>
<p><span style="font-weight: 400;">For instance, we can mark imported users by assigning them a custom attribute. This can be done using a hardcoded-attribute-mapper, which assigns a new attribute, authenticationMethod, to each new user and gives it the value &#8220;ldap&#8221;. </span></p>
<p><img decoding="async" data-attachment-id="6025" data-permalink="https://inero-software.com/exporting-accounts-to-federated-realms/6-2/" data-orig-file="https://inero-software.com/wp-content/uploads/2024/07/6.jpg" data-orig-size="1920,1080" data-comments-opened="0" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}" data-image-title="6" data-image-description="" data-image-caption="" data-medium-file="https://inero-software.com/wp-content/uploads/2024/07/6-300x169.jpg" data-large-file="https://inero-software.com/wp-content/uploads/2024/07/6-1030x579.jpg" tabindex="0" role="button" class="wp-image-6025 aligncenter" src="https://inero-software.com/wp-content/uploads/2024/07/6.jpg" alt="" width="597" height="336" srcset="https://inero-software.com/wp-content/uploads/2024/07/6.jpg 1920w, https://inero-software.com/wp-content/uploads/2024/07/6-300x169.jpg 300w, https://inero-software.com/wp-content/uploads/2024/07/6-1030x579.jpg 1030w, https://inero-software.com/wp-content/uploads/2024/07/6-768x432.jpg 768w, https://inero-software.com/wp-content/uploads/2024/07/6-1536x864.jpg 1536w, https://inero-software.com/wp-content/uploads/2024/07/6-533x300.jpg 533w" sizes="(max-width: 597px) 100vw, 597px" /></p>
<p><span style="font-weight: 400;">In the </span><b>Users</b><span style="font-weight: 400;"> -&gt; </span><b>User Details</b><span style="font-weight: 400;"> -&gt; </span><b>Attributes</b><span style="font-weight: 400;"> tab, we can then see that users originating from LDAP indeed have this attribute. It can, for example, be included in access tokens.</span></p>
<p><img loading="lazy" decoding="async" data-attachment-id="6026" data-permalink="https://inero-software.com/exporting-accounts-to-federated-realms/3-8/" data-orig-file="https://inero-software.com/wp-content/uploads/2024/07/3.jpg" data-orig-size="1920,1080" data-comments-opened="0" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}" data-image-title="3" data-image-description="" data-image-caption="" data-medium-file="https://inero-software.com/wp-content/uploads/2024/07/3-300x169.jpg" data-large-file="https://inero-software.com/wp-content/uploads/2024/07/3-1030x579.jpg" tabindex="0" role="button" class="wp-image-6026 aligncenter" src="https://inero-software.com/wp-content/uploads/2024/07/3.jpg" alt="" width="608" height="342" srcset="https://inero-software.com/wp-content/uploads/2024/07/3.jpg 1920w, https://inero-software.com/wp-content/uploads/2024/07/3-300x169.jpg 300w, https://inero-software.com/wp-content/uploads/2024/07/3-1030x579.jpg 1030w, https://inero-software.com/wp-content/uploads/2024/07/3-768x432.jpg 768w, https://inero-software.com/wp-content/uploads/2024/07/3-1536x864.jpg 1536w, https://inero-software.com/wp-content/uploads/2024/07/3-533x300.jpg 533w" sizes="(max-width: 608px) 100vw, 608px" /></p>
<h4><b>Example 2: group-ldap-mapper</b></h4>
<p><span style="font-weight: 400;">Often, LDAP defines a system of roles or groups that imported users belong to. Keycloak can also import groups and automatically assign the aforementioned users to them. To do this, we can configure another mapper, this time of the group-ldap-mapper type, as shown in the image below:</span></p>
<p><img loading="lazy" decoding="async" data-attachment-id="6027" data-permalink="https://inero-software.com/exporting-accounts-to-federated-realms/5-2/" data-orig-file="https://inero-software.com/wp-content/uploads/2024/07/5.jpg" data-orig-size="1920,1080" data-comments-opened="0" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}" data-image-title="5" data-image-description="" data-image-caption="" data-medium-file="https://inero-software.com/wp-content/uploads/2024/07/5-300x169.jpg" data-large-file="https://inero-software.com/wp-content/uploads/2024/07/5-1030x579.jpg" tabindex="0" role="button" class="alignnone wp-image-6027 size-full" src="https://inero-software.com/wp-content/uploads/2024/07/5.jpg" alt="" width="1920" height="1080" srcset="https://inero-software.com/wp-content/uploads/2024/07/5.jpg 1920w, https://inero-software.com/wp-content/uploads/2024/07/5-300x169.jpg 300w, https://inero-software.com/wp-content/uploads/2024/07/5-1030x579.jpg 1030w, https://inero-software.com/wp-content/uploads/2024/07/5-768x432.jpg 768w, https://inero-software.com/wp-content/uploads/2024/07/5-1536x864.jpg 1536w, https://inero-software.com/wp-content/uploads/2024/07/5-533x300.jpg 533w" sizes="(max-width: 1920px) 100vw, 1920px" /></p>
<p><span style="font-weight: 400;">In this case, the distinguished name for groups will be the same as the DN for all users, i.e.</span></p>
<p style="padding-left: 80px;"><span style="font-weight: 400; color: #0000ff;">ou=Users,o=66a20b93d2f2fc6db2e89ff3,dc=jumpcloud,dc=com</span></p>
<p><span style="font-weight: 400;">The groups stored in LDAP are defined by an object class named groupOfNames, which means that the attribute representing membership on the LDAP side will typically be member. Now, let&#8217;s try synchronizing our groups.</span></p>
<p><img loading="lazy" decoding="async" data-attachment-id="6028" data-permalink="https://inero-software.com/exporting-accounts-to-federated-realms/image_15/" data-orig-file="https://inero-software.com/wp-content/uploads/2024/07/image_15.jpg" data-orig-size="595,82" data-comments-opened="0" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}" data-image-title="image_15" data-image-description="" data-image-caption="" data-medium-file="https://inero-software.com/wp-content/uploads/2024/07/image_15-300x41.jpg" data-large-file="https://inero-software.com/wp-content/uploads/2024/07/image_15.jpg" tabindex="0" role="button" class="wp-image-6028 aligncenter" src="https://inero-software.com/wp-content/uploads/2024/07/image_15-300x41.jpg" alt="" width="622" height="85" srcset="https://inero-software.com/wp-content/uploads/2024/07/image_15-300x41.jpg 300w, https://inero-software.com/wp-content/uploads/2024/07/image_15.jpg 595w" sizes="(max-width: 622px) 100vw, 622px" /></p>
<p><span style="font-weight: 400;">As we can see, three groups were correctly imported, along with the relationships between a group and its users. Therefore, LDAP administrators can easily receive the corresponding permissions on our realm side. Subsequently, we could link specific roles to a given group to manage resource access even more conveniently.</span></p>
<p><img loading="lazy" decoding="async" data-attachment-id="6031" data-permalink="https://inero-software.com/exporting-accounts-to-federated-realms/2-9/" data-orig-file="https://inero-software.com/wp-content/uploads/2024/07/2.jpg" data-orig-size="1920,959" data-comments-opened="0" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}" data-image-title="2" data-image-description="" data-image-caption="" data-medium-file="https://inero-software.com/wp-content/uploads/2024/07/2-300x150.jpg" data-large-file="https://inero-software.com/wp-content/uploads/2024/07/2-1030x514.jpg" tabindex="0" role="button" class="alignnone wp-image-6031 size-full" src="https://inero-software.com/wp-content/uploads/2024/07/2.jpg" alt="" width="1920" height="959" srcset="https://inero-software.com/wp-content/uploads/2024/07/2.jpg 1920w, https://inero-software.com/wp-content/uploads/2024/07/2-300x150.jpg 300w, https://inero-software.com/wp-content/uploads/2024/07/2-1030x514.jpg 1030w, https://inero-software.com/wp-content/uploads/2024/07/2-768x384.jpg 768w, https://inero-software.com/wp-content/uploads/2024/07/2-1536x767.jpg 1536w, https://inero-software.com/wp-content/uploads/2024/07/2-601x300.jpg 601w" sizes="(max-width: 1920px) 100vw, 1920px" /><img loading="lazy" decoding="async" data-attachment-id="6030" data-permalink="https://inero-software.com/exporting-accounts-to-federated-realms/1-9/" data-orig-file="https://inero-software.com/wp-content/uploads/2024/07/1.jpg" data-orig-size="1920,881" data-comments-opened="0" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}" data-image-title="1" data-image-description="" data-image-caption="" data-medium-file="https://inero-software.com/wp-content/uploads/2024/07/1-300x138.jpg" data-large-file="https://inero-software.com/wp-content/uploads/2024/07/1-1030x473.jpg" tabindex="0" role="button" class="alignnone wp-image-6030 size-full" src="https://inero-software.com/wp-content/uploads/2024/07/1.jpg" alt="" width="1920" height="881" srcset="https://inero-software.com/wp-content/uploads/2024/07/1.jpg 1920w, https://inero-software.com/wp-content/uploads/2024/07/1-300x138.jpg 300w, https://inero-software.com/wp-content/uploads/2024/07/1-1030x473.jpg 1030w, https://inero-software.com/wp-content/uploads/2024/07/1-768x352.jpg 768w, https://inero-software.com/wp-content/uploads/2024/07/1-1536x705.jpg 1536w, https://inero-software.com/wp-content/uploads/2024/07/1-654x300.jpg 654w" sizes="(max-width: 1920px) 100vw, 1920px" /></p>
<h3><b>Summary</b></h3>
<p><span style="font-weight: 400;">Integrating Keycloak with LDAP is a powerful tool for managing identities and security within an organization. This integration allows for efficient synchronization of users and groups from LDAP, enabling centralized management of permissions and resource access. Key steps include configuring the LDAP connection, synchronizing data, and using mappers to customize imported information, such as attributes and user groups. It’s important to understand LDAP&#8217;s architecture and operations to fully leverage its capabilities. Implementing LDAP with Keycloak not only streamlines account management but also enhances security and simplifies integration with existing systems. By utilizing mappers, we can further tailor how information is imported and used in our system, leading to better organization and control over access within the organization.</span></p>
<p><a href="https://inero-software.com/keycloak-services/"><img loading="lazy" decoding="async" data-attachment-id="6008" data-permalink="https://inero-software.com/challenges-and-benefits-of-integrating-keycloak-compliance-with-the-nis-2-directive-and-practical-implementation-advice/banery-16072024en-inero/" data-orig-file="https://inero-software.com/wp-content/uploads/2024/07/banery-16072024en-inero.png" data-orig-size="1200,100" data-comments-opened="0" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}" data-image-title="banery 16072024en inero" data-image-description="" data-image-caption="" data-medium-file="https://inero-software.com/wp-content/uploads/2024/07/banery-16072024en-inero-300x25.png" data-large-file="https://inero-software.com/wp-content/uploads/2024/07/banery-16072024en-inero-1030x86.png" tabindex="0" role="button" class="alignnone wp-image-6008 size-full" src="https://inero-software.com/wp-content/uploads/2024/07/banery-16072024en-inero.png" alt="" width="1200" height="100" srcset="https://inero-software.com/wp-content/uploads/2024/07/banery-16072024en-inero.png 1200w, https://inero-software.com/wp-content/uploads/2024/07/banery-16072024en-inero-300x25.png 300w, https://inero-software.com/wp-content/uploads/2024/07/banery-16072024en-inero-1030x86.png 1030w, https://inero-software.com/wp-content/uploads/2024/07/banery-16072024en-inero-768x64.png 768w" sizes="(max-width: 1200px) 100vw, 1200px" /></a></p>
<p></p></div><div class="col-sm-1"></div></div>
<p>Artykuł <a href="https://inero-software.com/exporting-accounts-to-federated-realms/">Exporting accounts to federated realms: A guide to Keycloak and LDAP Integration</a> pochodzi z serwisu <a href="https://inero-software.com">Inero Software - Software Consulting</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">6022</post-id>	</item>
	</channel>
</rss>
