Skip to main content
Redhat Developers  Logo
  • AI

    Get started with AI

    • Red Hat AI
      Accelerate the development and deployment of enterprise AI solutions.
    • AI learning hub
      Explore learning materials and tools, organized by task.
    • AI interactive demos
      Click through scenarios with Red Hat AI, including training LLMs and more.
    • AI/ML learning paths
      Expand your OpenShift AI knowledge using these learning resources.
    • AI quickstarts
      Focused AI use cases designed for fast deployment on Red Hat AI platforms.
    • No-cost AI training
      Foundational Red Hat AI training.

    Featured resources

    • OpenShift AI learning
    • Open source AI for developers
    • AI product application development
    • Open source-powered AI/ML for hybrid cloud
    • AI and Node.js cheat sheet

    Red Hat AI Factory with NVIDIA

    • Red Hat AI Factory with NVIDIA is a co-engineered, enterprise-grade AI solution for building, deploying, and managing AI at scale across hybrid cloud environments.
    • Explore the solution
  • Learn

    Self-guided

    • Documentation
      Find answers, get step-by-step guidance, and learn how to use Red Hat products.
    • Learning paths
      Explore curated walkthroughs for common development tasks.
    • See all learning

    Hands-on

    • Developer Sandbox
      Spin up Red Hat's products and technologies without setup or configuration.
    • Interactive labs
      Learn by doing in these hands-on, browser-based experiences.
    • Interactive demos
      Click through product features in these guided tours.

    Browse by topic

    • AI/ML
    • Automation
    • Java
    • Kubernetes
    • Linux
    • See all topics

    Training & certifications

    • Courses and exams
    • Certifications
    • Skills assessments
    • Red Hat Academy
    • Learning subscription
    • Explore training
  • Build

    Get started

    • Red Hat build of Podman Desktop
      A downloadable, local development hub to experiment with our products and builds.
    • Developer Sandbox
      Spin up Red Hat's products and technologies without setup or configuration.

    Download products

    • Access product downloads to start building and testing right away.
    • Red Hat Enterprise Linux
    • Red Hat AI
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    • See all products

    Featured

    • Red Hat build of OpenJDK
    • Red Hat JBoss Enterprise Application Platform
    • Red Hat OpenShift Dev Spaces
    • Red Hat Developer Toolset

    References

    • E-books
    • Documentation
    • Cheat sheets
    • Architecture center
  • Community

    Get involved

    • Events
    • Live AI events
    • Red Hat Summit
    • Red Hat Accelerators
    • Community discussions

    Follow along

    • Articles & blogs
    • Developer newsletter
    • Videos
    • Github

    Get help

    • Customer service
    • Customer support
    • Regional contacts
    • Find a partner

    Join the Red Hat Developer program

    • Download Red Hat products and project builds, access support documentation, learning content, and more.
    • Explore the benefits

What's new in the Red Hat build of Keycloak version 22

November 15, 2023
Issa Gueye
Related topics:
OperatorsQuarkusSecurity
Related products:
Red Hat Single sign-onRed Hat OpenShift

    Continuing our mission to better support enterprise developers in securing modern applications, APIs, and services with minimum effort, Red Hat has released version 22.0 of the Red Hat build of Keycloak.

    The Red Hat build of Keycloak is a cloud-native Identity and Access Management (IAM) solution based on the Keycloak distribution powered by Quarkus. The Red Hat build of Keycloak replaces any plans for a future single sign-on (8.0 or higher) features release. Red Hat build of Keycloak is faster, more flexible, and optimized for running in the hybrid-cloud environment, while preserving the power and functionality of single sign-on.

    The release version 22.0 of Red Hat build of Keycloak has a number of great features and performance improvements, including tools to improve developer productivity. Let’s take a look at the key highlights of this release. For a complete list of new features, check out the official Red Hat build of Keycloak 22.0 release notes.

    Cloud-friendly and faster

    By leveraging the continuous improvements in the Quarkus framework for better performance and efficiency, Keycloak has significantly reduced its server startup time and memory footprint. Compared to the legacy Wildfly-based distribution, a Keycloak now running on top of Quarkus has a smaller distribution size with less dependencies, a faster start-up time (less cpu), and lower server memory footprint (heap and metaspace).

    The total size of the new distribution is almost half the size of the legacy Wildfly-based distribution. A performance benchmark for a very simple comparison between Keycloak running on Quarkus and Wildfly showed a significant gain on both startup time and memory footprint, nearly 50%.

    With these improvements, a Red Hat build of Keycloak provides users with a cloud-friendly IAM solution that is optimized for running in the hybrid cloud. It enables users for a cloud efficiency IAM deployment with cost savings and faster time to market.

    Better usability

    The new Keycloak distribution has a strong focus on usability. Users should expect a better experience when configuring and starting the server as well as when performing other common operations. There is a new CLI tool (kc.sh) providing a simpler configuration procedure using interactive command-line help instead of editing opaque and complex XML files like in the single sign-on (a legacy Wildfly-based Keycloak distribution).

    Users can choose from multiple configuration sources, such as a file, CLI, environment variables, or an encrypted KeyStore. Red Hat build of Keycloak can load the server’s configuration from five different sources with an order of application.

    In the context of Quarkus, Keycloak is essentially a Quarkus extension under the hood, so it can provide developers with more flexibility and modularity in the Quarkus ecosystem. Using Keycloak with Quarkus should be enjoyable for developers to build and add better custom providers extensions into the Red Hat build of Keycloak.

    Improved security

    Considering how critical an IAM solution is and the impact of misconfiguration on the overall security of the deployment, Red Hat build of Keycloak comes with the minimal configuration possible with a secure-by-default policy in mind. The idea is to provide the bare minimum configuration options to run the server while imposing some key constraints on how the configuration should be set before running in production. There is clear separation between development, testing, and production runtimes.

    Users can now start the Keycloak server in development mode or production mode. Each mode offers different defaults for the intended environment, but with more opinionated settings for the production mode. For instance, the production mode expects a hostname and a HTTPS/TLS setup to be available when starting the server. Without those further configurations, the kc.sh CLI tool will not start Keycloak and shows an error instead.

    FIPS 140-2 support

    Red Hat build of Keycloak 22.0 provides support for deploying and running Keycloak into a FIPS 140-2 enabled environment. The Federal Information Processing Standard Publication (FIPS) is a U.S. government computer security standard used to approve cryptographic modules. Red Hat build of Keycloak 22.0 supports running in FIPS 140-2 compliant mode. In this case, the Keycloak server will use only FIPS approved cryptographic algorithms for its functionality.

    New admin console

    Red Hat build of Keycloak 22.0 comes with a new admin console that provides an extensive and friendly interface for administrators and developers to configure and manage Keycloak. The new admin console is based on Patternfly and enables consistency and usability across the whole admin console pages for a better user experience and accessibility enhancements.

    A new Java-based operator

    The release 22.0 of Red Hat build of Keycloak includes a new operator for deploying and running Keycloak in Red Hat OpenShift environments. The new operator is now a Java-based operator, rewritten from scratch using the Java Operator SDK as compared to the legacy Go-based single sign-on operator.

    The new operator brings more flexibility and better architecture that shares business objects with the Keycloak main codebase. This increases the code-reuse and dramatically reduces the chances of introducing bugs in the translation process from Kubernetes resources. Also, the container image provides greater security for the operator by making the image based on UBI9 rather than UBI8 and using a UBI micro image, which helps reduce the attack surface. The new operator embraces the new cloud native capabilities of the Keycloak Quarkus distribution from the ground up, improving the overall user experience.

    Getting support

    Support for Red Hat build of Keycloak is available to Red Hat customers through a subscription. Contact your local Red Hat representative or Red Hat Sales for details on how to enjoy world-class support offered by Red Hat and its worldwide partner network. Customers can expect support for Red Hat Build of Keycloak and other runtimes according to the Red Hat Product Update and Support Lifecycle.

    Get started with Red Hat build of Keycloak

    Red Hat build of Keycloak 22.0 comes with many other features and improvements highlighted in the release notes. Ready to get started with Red Hat build of Keycloak? Here are more useful links to get you started:

    • Zip distributions are available through the Customer Portal.
    • Container distributions and operators for use on OpenShift are available in the Red Hat Ecosystem Catalog.
    • Product documentation set is available on the Red Hat customer portal, including a migration guide to help migrate your existing single sign-on deployments to Red Hat build of Keycloak.
    Last updated: November 20, 2023

    Related Posts

    • How to restrict user authentication in Keycloak during identity brokering

    • Keycloak: Core concepts of open source identity and access management

    • Docker Authentication with Keycloak

    • Single Sign-On Made Easy with Keycloak / Red Hat SSO

    Recent Posts

    • Confidential virtual machine storage attack scenarios

    • Introducing virtualization platform autopilot

    • Integrate zero trust workload identity manager with Red Hat OpenShift GitOps

    • Best Practice Configuration and Tuning for Linux and Windows VMs

    • Red Hat UBI 8 builders have been promoted to the Paketo Buildpacks organization

    What’s up next?

    Read Operating OpenShift, a practical guide to running and operating OpenShift clusters more efficiently using a site reliability engineering (SRE) approach. Learn best practices and tools that can help reduce the effort of deploying a Kubernetes platform.

    Get the e-book
    Red Hat Developers logo LinkedIn YouTube Twitter Facebook

    Platforms

    • Red Hat AI
    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    • See all products

    Build

    • Developer Sandbox
    • Developer tools
    • Interactive tutorials
    • API catalog

    Quicklinks

    • Learning resources
    • E-books
    • Cheat sheets
    • Blog
    • Events
    • Newsletter

    Communicate

    • About us
    • Contact sales
    • Find a partner
    • Report a website issue
    • Site status dashboard
    • Report a security problem

    RED HAT DEVELOPER

    Build here. Go anywhere.

    We serve the builders. The problem solvers who create careers with code.

    Join us if you’re a developer, software engineer, web designer, front-end designer, UX designer, computer scientist, architect, tester, product manager, project manager or team lead.

    Sign me up

    Red Hat legal and privacy links

    • About Red Hat
    • Jobs
    • Events
    • Locations
    • Contact Red Hat
    • Red Hat Blog
    • Inclusion at Red Hat
    • Cool Stuff Store
    • Red Hat Summit
    © 2026 Red Hat

    Red Hat legal and privacy links

    • Privacy statement
    • Terms of use
    • All policies and guidelines
    • Digital accessibility

    Chat Support

    Please log in with your Red Hat account to access chat support.