Skip to content

blog: Authelia vs keycloak #405

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Open
wants to merge 4 commits into
base: master
Choose a base branch
from
Open
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
180 changes: 180 additions & 0 deletions content/authelia-vs-keycloak/index.md

Large diffs are not rendered by default.

Binary file added static/blog-meta-images/authelia-vs-keycloak.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
27 changes: 25 additions & 2 deletions static/blog-seo/config.json
Original file line number Diff line number Diff line change
Expand Up @@ -3391,8 +3391,8 @@
],
"title": "Pillars of a CIAM Strategy: Secure, Scale & Personalize Customer Access",
"schema": "<script type=\"application/ld+json\"> {\n \"@context\": \"https://schema.org\",\n \"@type\": \"Article\",\n \"mainEntityOfPage\": {\n \"@type\": \"WebPage\",\n \"@id\": \"https://supertokens.com/blog/pillars-of-a-ciam-strategy-secure-scale-and-personalize-customer-access\"\n },\n \"headline\": \"Explore the key elements of a successful CIAM strategy: ensuring security, scalability, and personalized access for your customers. Start optimizing now!\",\n \"image\": \"https://supertokens.com/blog-meta-images/pillars-of-a-ciam-strategy-secure-scale-&-personalize-customer-access.png\",\n \"author\": {\n \"@type\": \"Organization\",\n \"name\": \"SuperTokens\",\n \"url\": \"https://supertokens.com\"\n },\n \"publisher\": {\n \"@type\": \"Organization\",\n \"name\": \"SuperTokens\",\n \"logo\": {\n \"@type\": \"ImageObject\",\n \"url\": \"https://supertokens.com/static/assets/dark-home/logo.png\"\n }\n }\n }</script>"
},
{
},
{
"path": "/blog/otp-bots",
"metaTags": [
"<meta name=\"description\" content=\"Explore how OTP bots bypass two-factor authentication (2FA), their growing threats, and strategies to protect your application using tools like SuperTokens.\" />",
Expand Down Expand Up @@ -3644,5 +3644,28 @@
],
"title": "SSO Examples: Real-World Use Cases and How to Implement Them",
"schema": "<script type=\"application/ld+json\"> {\n \"@context\": \"https://schema.org\",\n \"@type\": \"Article\",\n \"mainEntityOfPage\": {\n \"@type\": \"WebPage\",\n \"@id\": \"https://supertokens.com/blog/single-sign-on-examples\"\n },\n \"headline\": \"Explore real-world Single Sign-On (SSO) examples, use cases, and step-by-step implementation methods. Learn how tools like SuperTokens simplify SSO for developers.\",\n \"image\": \"https://supertokens.com/blog-meta-images/sso-examples.png\",\n \"author\": {\n \"@type\": \"Organization\",\n \"name\": \"SuperTokens\",\n \"url\": \"https://supertokens.com\"\n },\n \"publisher\": {\n \"@type\": \"Organization\",\n \"name\": \"SuperTokens\",\n \"logo\": {\n \"@type\": \"ImageObject\",\n \"url\": \"https://supertokens.com/static/assets/dark-home/logo.png\"\n }\n }\n }</script>"
},
{
"path": "/blog/authelia-vs-keycloak",
"metaTags": [
"<meta name=\"description\" content=\"In today’s world of logins, passwords, and the eternal struggle to remember which one you used where, organizations are on the hunt for single sign-on (SSO) solutions that don’t just work but actually make life easier. Think security that doesn’t buckle under pressure, scalability that grows with you, and integrations that play nice with all your apps and systems—basically, the holy trinity of access control.\" />",
"",
"<meta name=\"keywords\" content=\"Authentication, Open Source, Authorization, User Management, OAuth, Enterprise SSO, Security\" />",
"<!--OG Tags-->",
"<meta property=\"og:title\" content=\"Authelia vs Keycloak: Which One Suits You Best?\" />",
"<meta property=\"og:type\" content=\"article\" />",
"<meta property=\"og:url\" content=\"https://supertokens.com/blog/authelia-vs-keycloak\" />",
"<meta property=\"og:description\" content=\"In today’s world of logins, passwords, and the eternal struggle to remember which one you used where, organizations are on the hunt for single sign-on (SSO) solutions that don’t just work but actually make life easier. Think security that doesn’t buckle under pressure, scalability that grows with you, and integrations that play nice with all your apps and systems—basically, the holy trinity of access control.\"/>",
"<meta property=\"og:image\" content=\"https://supertokens.com/blog-meta-images/authelia-vs-keycloak.png\" />",
"",
"<meta name=\"twitter:card\" content=\"summary_large_image\" />",
"<meta name=\"twitter:title\" content=\"In today’s world of logins, passwords, and the eternal struggle to remember which one you used where, organizations are on the hunt for single sign-on (SSO) solutions that don’t just work but actually make life easier. Think security that doesn’t buckle under pressure, scalability that grows with you, and integrations that play nice with all your apps and systems—basically, the holy trinity of access control.\" />",
"<meta name=\"twitter:url\" content=\"https://supertokens.com/blog/authelia-vs-keycloak\" />",
"<meta name=\"twitter:image\" content=\"https://supertokens.com/blog-meta-images/authelia-vs-keycloak.png\" /> ",
"<!--OG Tags-->",
"<link rel=\"canonical\" href=\"https://supertokens.com/blog/authelia-vs-keycloak\">"
],
"title": "Authelia vs Keycloak: Which One Suits You Best?",
"schema": "<script type=\"application/ld+json\"> {\n \"@context\": \"https://schema.org\",\n \"@type\": \"Article\",\n \"mainEntityOfPage\": {\n \"@type\": \"WebPage\",\n \"@id\": \"https://supertokens.com/blog/authelia-vs-keycloak\"\n },\n \"headline\": \"In today’s world of logins, passwords, and the eternal struggle to remember which one you used where, organizations are on the hunt for single sign-on (SSO) solutions that don’t just work but actually make life easier. Think security that doesn’t buckle under pressure, scalability that grows with you, and integrations that play nice with all your apps and systems—basically, the holy trinity of access control.\",\n \"image\": \"https://supertokens.com/blog-meta-images/authelia-vs-keycloak.png\",\n \"author\": {\n \"@type\": \"Organization\",\n \"name\": \"SuperTokens\",\n \"url\": \"https://supertokens.com\"\n },\n \"publisher\": {\n \"@type\": \"Organization\",\n \"name\": \"SuperTokens\",\n \"logo\": {\n \"@type\": \"ImageObject\",\n \"url\": \"https://supertokens.com/static/assets/dark-home/logo.png\"\n }\n }\n }</script>"
}
]
3 changes: 3 additions & 0 deletions static/blog-seo/sitemapconfig.json
Original file line number Diff line number Diff line change
Expand Up @@ -358,5 +358,8 @@
},
{
"location": "https://supertokens.com/blog/single-sign-on-examples"
},
{
"location": "https://supertokens.com/blog/authelia-vs-keycloak"
}
]
Binary file added static/card_covers/authelia-vs-keycloak.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file added static/covers/authelia-vs-keycloak.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.