Thanks Bill. I'm envisioning a slide with 3 columns (one for OpenUnison, one for KC and one where there's overlap) so I'm going to try and keep it brief but will certainly talk to anything I don't write down.
Here's what I'm thinking for each column including your comments:
OpenUnison
Authentication
* Kerberos
* Certificate
* Banner
* Username Only
* OTP over SMS
* OTP over Email
* Symantec VIP
* JIT Provisioning
* Authentication Levels
User Data Sources
* Integrated Virtual Directory
Role Management
* Workflow based approvals
* Multi stage approvals
* Escalations
Application Integration
* Reverse Proxy with LastMile (J2EE/Apache/.NET)
* Reverse Proxy with SAML Login
* Reverse Proxy with Kerberos Constrained Delegation
UI Pages
* Generic JSP
Common
Authentication
* OIDC
* SAML2
* Social
* TOTP
* IdP "Broker" for both SAML2 and OIDC
* Login Chain / Flow
* Custom Interface
User Data Stores
* LDAP
* DB
* AD
* Custom
* Password reset
* Profile Updates
Role Management
* Map to multiple data sources
* Web services integration
Application Integration
* SAML2
* OIDC/OAuth2
* Reverse Proxy with header injection
KeyCloak
Authentication
* OIDC
* Social
* TOTP
* User session management
User Data Sources
* Integrated SPI
Role Management
* Local database
* Mapped to external data source
Application Integration
* OIDC/OAuth2
* REST Web Services
UI Pages
* Themed
* Internationalization/Localization
Anything you would like changed or mentioned?
Thanks