Bookmark this page

Summary

  • RH-SSO is composed of the Keycloak web application, a relational database, Red Hat JBoss EAP, and a set of adapters.

  • You can deploy RH-SSO in virtualized or bare metal environments, or container orchestration platforms.

  • RH-SSO allows four operating modes: stand-alone, stand-alone clustered, domain clustered, and cross-site replication.

  • The three RH-SSO key concepts are:

    • Users, which represent the people using your applications.

    • Clients, which are service accounts that authenticate users.

    • Realms, which are collections of users, credentials, groups, roles, role assignments, and clients.

  • You can perform administrative tasks through the RH-SSO Admin Console or the Admin CLI.

Revision: do313-7.6-bc10333