RH-SSO is composed of the Keycloak web application, a relational database, Red Hat JBoss EAP, and a set of adapters.
You can deploy RH-SSO in virtualized or bare metal environments, or container orchestration platforms.
RH-SSO allows four operating modes: stand-alone, stand-alone clustered, domain clustered, and cross-site replication.
The three RH-SSO key concepts are:
Users, which represent the people using your applications.
Clients, which are service accounts that authenticate users.
Realms, which are collections of users, credentials, groups, roles, role assignments, and clients.
You can perform administrative tasks through the RH-SSO Admin Console or the Admin CLI.