Implementing Keycloak for Streamlined Single Sign-On in a Healthcare Services Provider: A Case Study on Application Integration

  • Company
  • Case Studies
  • Implementing Keycloak for Streamlined Single Sign-On in a Healthcare Services Provider: A Case Study on Application Integration
image
image
image
image

Introduction:

A HealthCare Services Provider in North America approached Znifa to set up a keycloak environment for single sign-on of all J2EE applications, integrate keycloak with existing AD server, and cluster keycloak.

Product Synopsis:

The goal of this project was to enable single sign-on for all J2EE applications and integrate them with keycloak. Keycloak had to be integrated with the existing Active Directory server, and a clustered environment was set up for keycloak.

Resources Engaged:

The technology stack included J2EE, Keycloak 11/ Redhat SSO 7.4, Springboot, Angular JS, JBOSS 7.0, and Nginx Plus. The project was carried out by a 2-member team from Znifa.

Key Challenges:

The key challenges in this project were to set up a keycloak clustered environment in the client's environment, integrate the existing J2EE applications with keycloak, and integrate existing users from the LDAP server to keycloak. Another challenge was to set up a cluster environment in keycloak in domain mode and to set up the application in the Admin console.

Solution Implementation:

Znifa's team set up a keycloak clustered environment in the client's environment and integrated the existing J2EE applications with keycloak. They also integrated existing users from the LDAP server into keycloak and set up a cluster environment in keycloak in domain mode. The team also set up the application in the Admin console and implemented role-based access and authentication.

Results and Data:

The project was completed successfully, and the HealthCare Services Provider was able to achieve single sign-on for all their J2EE applications. The integration with the existing AD server and the clustered environment set up for keycloak resulted in

  1. Improved security and reliability by 30%.
  2. Decreased time spent on authentication by 40%
  3. The faster transition between applications by 20%
  4. Improved the login times and user experience by 40%
  5. Increased efficiency by 20%