March 27, 2025 by Appler LABS
Identity Service: Using Keycloak across your multiple applications with multi-tenacy

Identity Service: Using Keycloak across your multiple applications with multi-tenacy
To architect a multi-tenant strategy using Keycloak for registration, authentication, authorization, and managing users, roles, and role assignments across multiple applications with a single Keycloak instance, we need to carefully design the structure of realms, clients, users, groups, and roles. Below is a step-by-step approach based on the provided hierarchy and requirements:
1. Understanding the Requirements
From the image and description, the following key points are identified:
- Multi-Tenancy: The system supports multiple tenants (e.g.,
AMA
andIO
). - Isolation: Each tenant has isolated users, groups, and roles.
- Hierarchical Structure:
- Each tenant has an admin (
AMAAdmin
,InkOrbitAdmin
). - Each tenant can have multiple organizations (
AMAOrg1
,AMAOrg2
, etc.). - Each organization has its own set of users and administrators.
- Each tenant has an admin (
- Applications: Multiple applications need to be integrated with Keycloak for authentication and authorization.
- Management Screens: There are screens for adding users, roles, and assigning roles to users within each tenant.
2. Architecture Design
a. Realms
Keycloak uses realms as the top-level container for all authentication and authorization configurations. For a multi-tenant setup, you can use one of the following approaches:
- Single Realm with Tenant Isolation:
- Use a single realm (e.g.,
Default
) and isolate tenants using groups or custom attributes. - This approach simplifies management but requires careful design to ensure isolation.
- Use a single realm (e.g.,
- Multiple Realms:
- Create separate realms for each tenant (e.g.,
AMA
,IO
). - This approach provides strict isolation but may require more maintenance if there are many tenants.
- Create separate realms for each tenant (e.g.,
Given the requirement for strict isolation and the hierarchical structure in the diagram, the Multiple Realms approach is recommended.
b. Clients
Each application that integrates with Keycloak should be represented as a client within the relevant realm. For example:
- In the
AMA
realm, create clients for each application associated with theAMA
tenant. - Similarly, in the
IO
realm, create clients for applications associated with theIO
tenant.
Clients define the OAuth2/OpenID Connect configuration for each application, including scopes, redirect URIs, and other settings.
c. Users, Groups, and Roles
Users, groups, and roles are defined within each realm to ensure tenant isolation. Here’s how they can be structured:
Users:
- Each tenant has its own set of users.
- Users are created within the respective tenant’s realm.
Groups:
- Use groups to organize users hierarchically.
- For example:
- In the
AMA
realm:- Group:
AMAOrg1
- Subgroup:
AMAOrg1Admin
- Subgroup:
AMAOrg1User
- Subgroup:
- Group:
AMAOrg2
- Subgroup:
AMAOrg2Admin
- Subgroup:
AMAOrg2User
- Subgroup:
- Group:
- In the
IO
realm:- Group:
IoOrg1
- Subgroup:
IoOrg1Admin
- Subgroup:
- Group:
- In the
Roles:
- Define roles at the realm level or assign them to specific groups.
- For example:
- Realm-level roles:
TenantAdmin
,OrganizationAdmin
,User
. - Group-specific roles: Assign roles like
Admin
orUser
to the appropriate groups.
- Realm-level roles:
d. Role Assignments
- Roles can be assigned to users directly or via group membership.
- For example:
- Users in the
AMAOrg1Admin
group automatically inherit theAdmin
role. - Users in the
AMAOrg1User
group inherit theUser
role.
- Users in the
e. Registration and Authentication
- Registration:
- Use Keycloak’s built-in user federation mechanisms or custom registration flows.
- Ensure that users are registered in the correct realm based on their tenant.
- Authentication:
- Applications authenticate users by redirecting them to the appropriate Keycloak realm/client login page.
- Use OAuth2/OpenID Connect protocols for secure authentication.
f. Authorization
- Use Keycloak’s fine-grained authorization services (Authorization Services) to control access to resources.
- Define policies based on roles, groups, or custom attributes.
- Integrate the authorization server into your applications using the Keycloak adapter or API.
g. Management Screens
- Develop custom screens or use Keycloak’s Admin Console for managing users, groups, and roles.
- If custom screens are required:
- Use Keycloak’s REST API to programmatically manage users, groups, and roles.
- Implement UI components to add users, assign roles, and manage organizations.
3. Implementation Steps
Step 1: Set Up Realms
- Create realms for each tenant (e.g.,
AMA
,IO
). - Configure each realm with the necessary settings (e.g., themes, email templates).
Step 2: Define Clients
- For each application, create a client in the appropriate realm.
- Configure client settings such as redirect URIs, scopes, and access types.
Step 3: Create Users, Groups, and Roles
- Within each realm, create users and organize them into groups based on the hierarchical structure.
- Define roles at the realm level or assign them to groups.
Step 4: Implement Registration and Authentication
- Configure registration flows in Keycloak or implement custom registration logic.
- Integrate applications with Keycloak using OAuth2/OpenID Connect.
Step 5: Set Up Authorization
- Use Keycloak’s Authorization Services to define policies and permissions.
- Integrate the authorization server into your applications.
Step 6: Develop Management Screens
- Use Keycloak’s Admin Console for basic management or develop custom screens using the Keycloak REST API.
- Implement UI components for adding users, assigning roles, and managing organizations.
4. Example Structure
Realms
AMA
- Clients:
Application1
,Application2
- Groups:
AMAOrg1
- Subgroups:
AMAOrg1Admin
,AMAOrg1User
- Subgroups:
AMAOrg2
- Subgroups:
AMAOrg2Admin
,AMAOrg2User
- Subgroups:
- Roles:
TenantAdmin
,OrganizationAdmin
,User
- Clients:
IO
- Clients:
Application3
,Application4
- Groups:
IoOrg1
- Subgroups:
IoOrg1Admin
- Subgroups:
- Roles:
TenantAdmin
,OrganizationAdmin
,User
- Clients:
Authentication Flow
- User accesses an application.
- Application redirects the user to the appropriate Keycloak realm/client login page.
- User authenticates, and Keycloak issues an access token.
- Application uses the access token to make requests to protected resources.
Authorization Flow
- Keycloak evaluates the user’s roles and group memberships.
- Based on predefined policies, Keycloak determines whether the user has access to the requested resource.
- Access is granted or denied accordingly.
5. Keycloak REST API Usage
For custom management screens, you can use Keycloak’s REST API to perform operations such as:
- Creating/Managing users:
/auth/admin/realms/{realm}/users
- Managing groups:
/auth/admin/realms/{realm}/groups
- Assigning roles:
/auth/admin/realms/{realm}/users/{userId}/role-mappings
6. Security Considerations
- Ensure proper access controls for the Keycloak Admin Console and REST API.
- Use HTTPS for all communication.
- Implement rate limiting and IP whitelisting for sensitive APIs.
Conclusion
By using multiple realms for tenant isolation and leveraging Keycloak’s features for users, groups, roles, and authorization, you can effectively architect a multi-tenant system. The provided structure ensures clear separation between tenants while providing flexibility for managing users, roles, and applications. Custom management screens can be built using Keycloak’s REST API to meet specific requirements.