Loading...
Please wait a moment
Founded by passionate advocates of learning and innovation, Learni set out to make professional training accessible to everyone, everywhere in the world. Our team works in the largest cities such as Paris, Lyon, Marseille, and internationally, to support talents and organizations in their skills development.
Which format do you prefer?
30 free minutes with a training advisor — no commitment.
Loading available slots...
Professional Training training in Memphis in October 2026 with Learni. Certified, expert trainers, eligible for employer funding. Free quote.
No-Code / Low-Code training in Leeds in November 2026 with Learni. Certified, expert trainers, eligible for employer funding. Free quote.
Master influence and persuasion skills for 2026 with proven strategies, emerging tech, and practical exercises tailored for professional growth in a dynamic world.
Professional Training training in New York in September 2026 with Learni. Certified, expert trainers, eligible for employer funding. Free quote.
The Training Keycloak - Securing Identity in the Enterprise training is delivered in-person or remotely (blended-learning, e-learning, virtual classroom, remote in-person). At Learni, a Qualiopi-certified training organization, each program is designed to maximize skills acquisition, regardless of the training mode chosen.
The trainer alternates between demonstrative, interrogative, and active methods (through practical exercises and/or real-world scenarios). This pedagogical approach ensures concrete and directly applicable learning in the workplace.
To ensure the quality of the Training Keycloak - Securing Identity in the Enterprise training, Learni provides the following teaching resources:
For in-house training at a location external to Learni, the client ensures and commits to having all necessary teaching materials (IT equipment, internet connection...) for the proper conduct of the training action in accordance with the prerequisites indicated in the communicated training program.
The assessment of skills acquired during the Training Keycloak - Securing Identity in the Enterprise training is carried out through:
Learni is committed to the accessibility of its professional training programs. All our training programs are accessible to people with disabilities. Our teams are available to adapt teaching methods to your specific needs. Do not hesitate to contact us for any accommodation request.
Learni training programs are available for inter-company and intra-company settings, both in-person and remote. Registration is possible up to 48 business hours before the start of training. Our programs are eligible for OPCO, Pôle emploi, and FNE-Formation funding. Contact us to discuss your training project and funding possibilities.
Dive into Keycloak architecture by creating multiple realms adapted to the enterprise, configure OAuth2 and OpenID Connect clients with custom scopes, test authorization flows on real web application cases, use the admin interface to map user roles, perform practical identity federation exercises, produce an initial documented deployment diagram to boost your professional skills.
Integrate Keycloak with LDAP/Active Directory directories for bulk user synchronization, configure SAML identity brokers for multi-domain SSO, implement MFA with TOTP and WebAuthn on critical scenarios, simulate attacks and responses via practical exercises, generate GDPR compliance audit reports, apply configurations to an enterprise red thread project, transform your skills into immediate certifying assets.
Develop Keycloak UI themes with Freemarker for enterprise branding, extend functionalities via SPI by coding custom Java providers, integrate JavaScript scripts for advanced business logic, test extensions on staging environments with tools like Postman, debug via logs and traces, produce a reusable extensions kit for your projects, acquire rare and valuable professional expertise.
Strengthen Keycloak against attacks with Brute Force Detection policies and Step-up Authentication, configure JWT token encryption and PKI key management, integrate Prometheus/Grafana monitoring for real-time alerts, simulate security incidents on high-load clusters, analyze logs with ELK Stack, optimize performance via Infinispan cache, deliver an operational security dashboard, master critical skills for certified enterprises.
Deploy Keycloak in HA cluster with Docker Compose and Helm on Kubernetes, automate CI/CD pipelines via GitLab/Jenkins for zero-downtime deployments, configure replicated Infinispan/PostgreSQL databases, test failover and scalability under JMeter load, integrate with AWS/GCP cloud services, finalize red thread project with full audit, leave with production-deployable skills to accelerate your career.
Target audience
Security architects, DevOps, IAM administrators for professional skill development
Prerequisites
Mastery of Java, OAuth2/OpenID Connect/SAML, Linux server administration
Loading...
Please wait a moment





























