You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Our goal is to evaluate whether KeyCloak alone, only with configuration, can support all the authorization workflows VEDA requires or whether additional solutions that build on top of KeyCloak are needed or desirable.
We decided to create an evaluation matrix about:
Whether the solution in its current form (only with configuration) supports a workflow
Whether additional custom development by us is needed
What effort it would make to maintain the solution longer-term
How well the target solution supports the use case
Preferable is a community-maintained free and open source solution with as little customization as possible, with the default being vanilla KeyCloak (most recent stable version).
If that performs well on all workflows, great. If there are reasons to look beyond, we will have them well documented.
Acceptance criteria
Created evaluation matrix in the docs of this repo
The text was updated successfully, but these errors were encountered:
Our goal is to evaluate whether KeyCloak alone, only with configuration, can support all the authorization workflows VEDA requires or whether additional solutions that build on top of KeyCloak are needed or desirable.
We decided to create an evaluation matrix about:
Preferable is a community-maintained free and open source solution with as little customization as possible, with the default being vanilla KeyCloak (most recent stable version).
If that performs well on all workflows, great. If there are reasons to look beyond, we will have them well documented.
Acceptance criteria
The text was updated successfully, but these errors were encountered: