<html>
<head>
<meta content="text/html; charset=windows-1252"
http-equiv="Content-Type">
</head>
<body bgcolor="#FFFFFF" text="#000000">
<br>
<br>
<div class="moz-cite-prefix">On 1/11/2016 11:49 PM, Sonia Marginean
wrote:<br>
</div>
<blockquote
cite="mid:9D9D54E9-4250-43DF-BF40-19F3E243FD02@bazaarvoice.com"
type="cite">
<meta http-equiv="Content-Type" content="text/html;
charset=windows-1252">
<meta name="ProgId" content="OneNote.File">
<meta name="Generator" content="Microsoft OneNote 15">
<div>Hello, </div>
<div><br>
</div>
<div>My org is researching different open source solutions for
IDP, SSO and Inbound Federation.</div>
<div>We are looking into Okta and we’d like to ask a few
questions:</div>
<ul>
<li>Is there any support/training we can get for KeyCloak?</li>
</ul>
</blockquote>
2016 It will be supported by Red Hat in product.<br>
<blockquote
cite="mid:9D9D54E9-4250-43DF-BF40-19F3E243FD02@bazaarvoice.com"
type="cite">
<ul>
<li>Are there any customer success stories anyone can share?</li>
</ul>
</blockquote>
Yes, but I haven't put them on the website. Lack of time<br>
<blockquote
cite="mid:9D9D54E9-4250-43DF-BF40-19F3E243FD02@bazaarvoice.com"
type="cite">
<ul>
<li>Does Keycloak provide and UI for inbound federation setup or
Workflow</li>
</ul>
</blockquote>
Yes<br>
<blockquote
cite="mid:9D9D54E9-4250-43DF-BF40-19F3E243FD02@bazaarvoice.com"
type="cite">
<ul>
<li>What are the limits of key cloak with respect to scaling?
What is the largest DB key cloak can work with, that someone
has tried? (In terms of number of users)</li>
</ul>
</blockquote>
Community will have to answer this. Keycloak is clusterable and
backed by a distributed cache (Infinispan). We are currently
working with performance team to get some good stress tests and
benchmarks in place as we have fallen behind in keeping up with
performance testing.<br>
<blockquote
cite="mid:9D9D54E9-4250-43DF-BF40-19F3E243FD02@bazaarvoice.com"
type="cite">
<ul>
<li>Do you provide any mechanism for adaptive authentication?
Like requiring additional authentication steps based on
authentication patterns (e.g. If a user logins from a
different country than the one he has been logging in from
usually, enforce a policy, like require MFA)</li>
</ul>
</blockquote>
We have an Auth SPI where you can code whatever you want for login
flow, registration flow, reset credentials flow, broker flow, etc..<br>
<blockquote
cite="mid:9D9D54E9-4250-43DF-BF40-19F3E243FD02@bazaarvoice.com"
type="cite">
<div><br>
</div>
<div>Thanks,</div>
<div>Sonia Marginean </div>
<div>@Bazaarvoice</div>
<div>
<ol style="margin-left: 0.75in; direction: ltr; unicode-bidi:
embed; margin-top: 0in; margin-bottom: 0in; font-family:
Calibri; font-size: 11pt;" type="a">
</ol>
<!--EndFragment--></div>
<div>
</div>
<br>
<fieldset class="mimeAttachmentHeader"></fieldset>
<br>
<pre wrap="">_______________________________________________
keycloak-user mailing list
<a class="moz-txt-link-abbreviated" href="mailto:keycloak-user@lists.jboss.org">keycloak-user@lists.jboss.org</a>
<a class="moz-txt-link-freetext" href="https://lists.jboss.org/mailman/listinfo/keycloak-user">https://lists.jboss.org/mailman/listinfo/keycloak-user</a></pre>
</blockquote>
<br>
<pre class="moz-signature" cols="72">--
Bill Burke
JBoss, a division of Red Hat
<a class="moz-txt-link-freetext" href="http://bill.burkecentral.com">http://bill.burkecentral.com</a></pre>
</body>
</html>