Login
Remember
Register
Ask a Question
Recent questions and answers in Keycloak
0
votes
1
answer
Which among the following is the full-fledged authentication and authorization protocol?
answered
Mar 8, 2022
in
Keycloak
by
sharadyadav1986
authentication-protocol
authorization-protocol
0
votes
1
answer
The entities that request Keycloak to authenticate a user are called as ____________.
answered
Mar 8, 2022
in
Keycloak
by
sharadyadav1986
keycloak-authentication
0
votes
1
answer
The process of granting access privileges to a user/program is known as ____________.
answered
Mar 8, 2022
in
Keycloak
by
sharadyadav1986
user-access
grant-access
user-provileges
0
votes
1
answer
Which among the following protocols has its roots in SOAP and WS-Specifications?
answered
Mar 8, 2022
in
Keycloak
by
sharadyadav1986
soap
ws-specifications
root-protocol
0
votes
1
answer
The ________ contains information about the user, such as username and email.
answered
Mar 8, 2022
in
Keycloak
by
sharadyadav1986
user-information
keycloak
0
votes
1
answer
________ protocol is more suited to work with HTML5/Javascript applications due to ease of implementation.
answered
Mar 8, 2022
in
Keycloak
by
sharadyadav1986
protocol
javascript-application
0
votes
1
answer
A user can be allocated to only one role.
answered
Mar 8, 2022
in
Keycloak
by
sharadyadav1986
role-allocation
0
votes
1
answer
____________ identify/identifies the type or category of a user.
answered
Mar 8, 2022
in
Keycloak
by
sharadyadav1986
use-category
0
votes
1
answer
Verifying the identity of an entity to allow access to a resource is known as __________.
answered
Mar 8, 2022
in
Keycloak
by
sharadyadav1986
resource-access
identity-entity
0
votes
1
answer
What is the highest level in the hierarchy of realms?
answered
Mar 8, 2022
in
Keycloak
by
sharadyadav1986
reals-hierarchy
0
votes
1
answer
SAML 2.0 works by exchanging ___________ between the application and the authentication server.
answered
Mar 8, 2022
in
Keycloak
by
sharadyadav1986
keycloak-authentication
+1
vote
1
answer
A/An ________ token contains information about user role mapping.
answered
Mar 8, 2022
in
Keycloak
by
sharadyadav1986
keycloak-token
0
votes
1
answer
Admin accounts created in the master realm have permissions to view and manage any other realm created on the server instance.
answered
Mar 8, 2022
in
Keycloak
by
sharadyadav1986
keycloak-accounts
0
votes
1
answer
Master realms are usually reserved for super administrators for creating and managing the realms in a system.
answered
Mar 8, 2022
in
Keycloak
by
sharadyadav1986
realms-manage
keycloak
0
votes
1
answer
A __________ defines the conditions that must be satisfied to grant access to an object.
answered
Mar 8, 2022
in
Keycloak
by
sharadyadav1986
object-access
keyclock
0
votes
1
answer
Which of the following is a benefit of Identity and Access Management?
answered
Mar 8, 2022
in
Keycloak
by
sharadyadav1986
identity-management
access-management
keyclock
+2
votes
1
answer
Keycloak is an Identity Provider (IDP)
answered
Jan 1, 2022
in
Keycloak
by
GeorgeBell
keyclock
+2
votes
1
answer
The feature of logging into social networks can be facilitated using Keycloak
answered
Jan 1, 2022
in
Keycloak
by
GeorgeBell
keyclock
+2
votes
1
answer
Identity Management and Identity Access Management are two different disciplines.
answered
Jan 1, 2022
in
Keycloak
by
GeorgeBell
keyclock
+2
votes
1
answer
Which of the following standard protocols does Keycloak Support?
answered
Jan 1, 2022
in
Keycloak
by
GeorgeBell
keyclock
+2
votes
1
answer
Keycloak can only be used to authenticate applications and not individual users
answered
Jan 1, 2022
in
Keycloak
by
GeorgeBell
keyclock
+2
votes
1
answer
Which of the following are consequences of poor identity management?
answered
Jan 1, 2022
in
Keycloak
by
GeorgeBell
keyclock
Help get things started by
asking a question
.
Recent questions and answers in Keycloak
...