Software Alternatives & Reviews

Keycloak VS Google Cloud IAM

Compare Keycloak VS Google Cloud IAM and see what are their differences

Keycloak

Open Source Identity and Access Management for modern Applications and Services.

Google Cloud IAM

Google Cloud Identity & Access Management (IAM) lets administrators authorize who can take action on specific resources, giving you full control and visibility to manage cloud resources centrally.
  • Keycloak Landing page
    Landing page //
    2022-03-20
  • Google Cloud IAM Landing page
    Landing page //
    2023-07-29

Keycloak

Categories
  • Identity And Access Management
  • Identity Provider
  • SSO
  • Web Security
Website keycloak.org  
Details $

Google Cloud IAM

Categories
  • Identity And Access Management
  • Identity Provider
  • SSO
  • Single Sign-On
Website cloud.google.com  
Details $-

Keycloak videos

What is Keycloak and what are the main features | DevNation Live

More videos:

  • Review - Keycloak Overview
  • Review - Easily Secure Your Front and Back End app with Keycloak

Google Cloud IAM videos

Manage Access Control with Google Cloud IAM | Google Cloud Labs

Category Popularity

0-100% (relative to Keycloak and Google Cloud IAM)
Identity And Access Management
Identity Provider
56 56%
44% 44
SSO
54 54%
46% 46
Web Security
100 100%
0% 0

User comments

Share your experience with using Keycloak and Google Cloud IAM. For example, how are they different and which one is better?
Log in or Post with

Reviews

These are some of the external sources and on-site user reviews we've used to compare Keycloak and Google Cloud IAM

Keycloak Reviews

12 User Authentication Platforms [Auth0, Firebase Alternatives]
You can integrate Keycloak with your applications to have a single-sign-in and single-sign-out experience. Moreover, one can activate social logins without any modification in code. Additionally, it allows user authentication via existing OpenID Connect or SAML 2.0
Source: geekflare.com
10+ Open-source Single-Sign On (SSO) Solutions
Keycloak is a free, open-source identity and access management system with highly configurable Single-Sign-On (SSO) support.
Source: medevel.com
10 Best Auth0 Alternatives and Similar Platforms
Keycloak may be quite beneficial because it provides a built-in method for syncing with databases, such as LDAP or Active Directory, when your users already are registered on. If you use Social Login for social platforms such as Facebook, Keycloak might be a great tool for your organization.
Top 5 Open Source Single Sign-On Software In the Year 2021
KeyCloak is another free software that is based on OpenID Connect, OAuth2.0, and SAML2.0. It provides SSO capabilities across web applications and web services. Above all, this open source software provides integrations with LDAP and Active Directory. There is a logical user interface where users can manage roles, permissions, and sessions. Moreover, this free solution...
IAM: A comparison of open-source tools
/ Digitalberry news / IAM: A comparison of open-source toolsIAM: A comparison of open-source toolsWhy use an Identity Provider (IdP)?Comparative study of Identity Providers (IdP)1. Our team’s first choice: Keycloak2. In second place of our comparative study: Gluu3. Special mention: FusionAuthDiscover our expertiseContact our experts

Google Cloud IAM Reviews

Top 11 Identity & Access Management Tools
This means that it is fair to pick up Google Cloud as your IAM simply based on those numbers. But what does Google Cloud IAM do differently than Azure and AWS?
Source: spectralops.io

Social recommendations and mentions

Based on our record, Google Cloud IAM should be more popular than Keycloak. It has been mentiond 6 times since March 2021. We are tracking product recommendations and mentions on various public social media platforms and blogs. They can help you identify which product is more popular and what people think of it.

Keycloak mentions (4)

  • Beyond the login page
    Most of the time nowadays, I prefer offloading this to an identity provider, using OpenID Connect or soon Federated Credential Management (FedCM), even if that means shipping an identity provider as part of the deliverables (I generally go with Keycloak, with keycloak-config-cli to provision its configuration). I'm obviously biased though as I work in IT services, developping software mainly for... - Source: dev.to / 3 months ago
  • Okta Says Hackers Stole Data for All Customer Support Users
    Yet another breach of Okta... Why are companies not running something like keycloak [1] themselves? Are administrative/maintenance costs too high or is it plausible deniability? [1] https://keycloak.org. - Source: Hacker News / 3 months ago
  • I built a ready-to-use auth server with TypeScript and Express.js
    I'd stick with a solution like https://keycloak.org in that instance. Source: 11 months ago
  • Authelia is an open-source authentication/authorization server with 2FA/SSO
    A few more projects in this space: - Keycloak (you won't get fired for picking this)[0] - CloudFoundry's UAA[1] - Gluu [2] - Keratin [3] - OpenUnison [4] - Dex[5] - Netlify's GoTrue[6] All of these solutions are a bit different but here are some of the axes: - Whether or not they function as an OAuth provider - Whether they're centered around application-user-login (email + password) or application auth (OAuth) or... - Source: Hacker News / almost 3 years ago

Google Cloud IAM mentions (6)

  • IAM Best Practices [cheat sheet included]
    While it is commonly associated with AWS, and their AWS IAM service, IAM is not limited to their platform. All cloud providers, such as Google Cloud and Azure DevOps, offer IAM solutions that allow users to access resources and systems. If you are looking for specific AWS IAM best practices, look no further than our AWS IAM Security Best Practices article:\ For the rest of this article, we will look at the... - Source: dev.to / about 1 year ago
  • Cloud Incident Response
    Cloud Identity and Access Management: This service provides fine-grained control over who has access to what resources within an organization's Google Cloud environment. It can be used to quickly revoke access to compromised accounts or limit access to sensitive resources. Https://cloud.google.com/iam. - Source: dev.to / about 1 year ago
  • Google Cloud Reference
    Cloud IAM: Resource access control 🔗Link 🔗Link. - Source: dev.to / over 1 year ago
  • Five Dex Alternatives for Kubernetes Authentication
    OAuth 2.0 authenticates both service accounts and user accounts in GKE. This authentication protocol uses the OpenID Connect method to verify the identity of Kubernetes clusters. GKE is integrated with Google Cloud IAM, so you can also use IAM to control access to your clusters or to configure a user to control the GKE cluster and Google Cloud resources. - Source: dev.to / over 1 year ago
  • GCP security best practices
    GCP Identity and Access Management (IAM) helps enforce least privilege access control to your cloud resources. You can use IAM to restrict who is authenticated (signed in) and authorized (has permissions) to use resources. - Source: dev.to / about 2 years ago
View more

What are some alternatives?

When comparing Keycloak and Google Cloud IAM, you can also consider the following products

Auth0 - Auth0 is a program for people to get authentication and authorization services for their own business use.

Okta - Enterprise-grade identity management for all your apps, users & devices

OneLogin - On-demand SSO, directory integration, user provisioning and more

Atlassian Crowd - Crowd is a single sign-on and user identity solution.

Amazon Cognito - Amazon Cognito lets you add user sign-up, sign-in, and access control to your web and mobile apps quickly and easily. It scales to millions of users and supports sign-in with social identity providers and enterprise identity providers via SAML 2.0.

FusionAuth - FusionAuth is a CIAM platform that is 100% free for unlimited users.