Hi,
We are planning to setup Keycloak in new Network and network security team need some
information. Can you please help us with the answer of the following queries?
How is this user data secured in rest and in transit?
How is in control of Keyclock? and do you have the correct process around access, Starters
movers leavers etc?
Thanks & Regards,
Ranjan Pakira
This message contains information that may be privileged or confidential and is the
property of the Capgemini Group. It is intended only for the person to whom it is
addressed. If you are not the intended recipient, you are not authorized to read, print,
retain, copy, disseminate, distribute, or use this message or any part thereof. If you
receive this message in error, please notify the sender immediately and delete all copies
of this message.