Threat Mitigation
Deployed Keycloak password database has a configuration of 20 000 hash iterations for PBKDF2. At Cloud-IAM we enforce security over performance and so we size the clusters accordingly.
Each Keycloak nodes is not directly opened to the network, it is behind a load balancer that verify the hostname.
Each Keycloak nodes is not directly opened to the network, it is behind a load balancer that verify the hostname.
Updated on: 18/03/2022
Thank you!