To ensure that only authorized users get access to your resources, users must be authenticated. Once a user is authenticated, they can be authorized to perform specific actions.
Keycloak is used for identity and access management. This open-source solution provides a variety of options for authentication and authorization. Users authenticate with Keycloak rather than the application, allowing flexibility in how the sign-in experience is delivered. Keycloak is included in the core services that you deploy. For information about Keycloak, visit https://www.keycloak.org.