Keycloak

Glossary Page

Keycloak is an open-source identity and access management solution that provides authentication, authorization, and single sign-on capabilities for applications and services. It enables organizations to secure their applications and APIs by managing user identities, defining access policies, and integrating with various identity providers and authentication mechanisms. Keycloak supports standards like OAuth 2.0, OpenID Connect, and SAML for secure identity management.

https://www.keycloak.org/ external-link

Latest Webinars

Latest Articles

Blog Post Cover

T-Systems is now Catena-X-certified for Company Certificate Management

T-Systems has been officially certified by Catena-X for the Company Certificate Management use case—marking a key milestone for secure and scalable data collaboration in the ecosystem. With our Connect & Integrate solution, companies can get started quickly and in full compliance, without technical complexity. The fully Catena-X-compliant infrastructure (CX-0135) includes features like automated expiry alerts, revocation handling, and seamless integration with internal systems. This helps organizations manage digital identities more efficiently and build trust across company borders.

Read more

external-link
Author image

Andrea Garcia

Jul 25, 2025

Blog Post Cover

ADIS: Traceability & PCF in Catena-X

ADIS, a leading Tier-1 supplier, partnered with T-Systems to enable scalable, Catena-X-compliant data exchange. Leveraging the "Connect & Integrate" solution, ADIS achieved fast onboarding via a sandbox-to-Pre-Prod approach, enhancing traceability and carbon footprint visibility. This strategic move aligns with industry standards, ensures regulatory compliance, and supports long-term participation in the evolving Catena-X ecosystem—without major in-house development.

Read more

external-link
Author image

Andrea Garcia

Jun 10, 2025

Blog Post Cover

Making manufacturing systems talk to each other

Interoperability in manufacturing is often misunderstood. Not because companies doubt its importance, but because it's difficult to visualize what success looks like. This blog uses simple analogies to explain the core challenges: outdated machines that can’t “speak” to modern systems, and people hesitant to share data without context or trust. With solutions like Asset Administration Shells and Data Spaces, manufacturers can unlock hidden value, foster secure collaboration, and take real steps toward digital transformation.

Read more

external-link
Author image

Nick Jephcott

May 18, 2025