Newer
Older
1001
1002
1003
1004
1005
1006
1007
1008
1009
1010
1011
1012
1013
1014
1015
1016
1017
1018
1019
1020
1021
1022
1023
1024
1025
1026
1027
1028
1029
1030
1031
1032
1033
1034
1035
1036
1037
1038
1039
1040
1041
1042
1043
1044
1045
1046
1047
1048
1049
1050
1051
1052
1053
1054
1055
1056
1057
1058
1059
1060
1061
1062
1063
1064
1065
1066
1067
1068
1069
1070
1071
1072
1073
1074
1075
1076
1077
1078
1079
1080
1081
1082
1083
1084
1085
1086
1087
1088
1089
1090
1091
1092
1093
1094
1095
1096
1097
1098
1099
1100
1101
1102
1103
1104
1105
1106
1107
1108
1109
1110
1111
1112
1113
1114
1115
1116
1117
1118
1119
1120
1121
1122
1123
1124
1125
1126
1127
1128
1129
1130
1131
1132
1133
1134
1135
1136
1137
1138
1139
1140
1141
1142
1143
1144
1145
1146
1147
1148
1149
1150
1151
1152
1153
1154
1155
1156
1157
1158
1159
1160
1161
1162
1163
1164
1165
1166
1167
1168
1169
1170
1171
1172
1173
1174
1175
1176
1177
modified, disabled, or removed, or when users are terminated or transferred.
- uuid: cb4929fc-3685-45e4-8720-405dc5ed9ea3
control-id: ac-2.13
description: Keycloak allows the creation of clients that provide login to
app via Keycloak, allowing account management to be inherited from keycloak.
There are roughly 30 different event types in keycloak and an event listener
can be configured and automated via email, external webhook, and logging
stack monitored by admins to notify when an account is created, enabled,
modified, disabled, or removed, or when users are terminated or transferred.
- uuid: b704526e-e18f-46ec-8072-2e361115265a
control-id: ac-3
description: Keycloak allows the creation of clients that provide login to
app via Keycloak, allowing account management to be inherited from keycloak
and the enforcement of approved authorizaions for logical access to information
and system resources.
- uuid: ef73dc31-ab9a-4d67-b5b8-c042e47aba25
control-id: ac-4
description: Keycloak is designed and recommended to be deployed in a stand-alone
BB cluster with TLS passthrough for OIDC/SAML integration. Controls are
inherited from istio via network policies, virtual services and gateway
configs.
- uuid: 34ea5ae5-3525-4a81-974f-a73e1999610f
control-id: ac-4.4
description: Keycloak is designed and recommended to be deployed in a stand-alone
BB cluster with TLS passthrough for OIDC/SAML integration. Controls are
inherited from istio via network policies, virtual services and gateway
configs.
- uuid: 25a717a7-3f1f-4d24-9cc1-701be6f97df9
control-id: ac-5
description: Keycloak is designed and recommended to be deployed in a stand-alone
BB cluster with TLS passthrough for OIDC/SAML integration. Controls are
inherited from istio via network policies, virtual services and gateway
configs.
- uuid: 28fba4bc-e1ae-4164-9673-6ed90d93a7c0
control-id: ac-6
description: Keycloak as an IDM / IAM provider supports least privilege through
user / group management (ABAC / RBAC) service offerings
- uuid: 2f8de149-d07f-4e8a-8baf-5bdbace0cf8d
control-id: ac-6.1
description: Keycloak as an IDM / IAM provider supports least privilege through
user / group management (ABAC / RBAC) service offerings
- uuid: 5a04932c-05cf-489a-932c-cb31b9480b73
control-id: ac-6.2
description: Keycloak as an IDM / IAM provider supports least privilege through
user / group management (ABAC / RBAC) service offerings
- uuid: 337a9b7f-71d0-46ef-aaa2-af5367d9b371
control-id: ac-6.5
description: Keycloak as an IDM / IAM provider supports least privilege through
user / group management (ABAC / RBAC) service offerings
- uuid: 6de217bb-f767-4af0-b813-b54df9baf173
control-id: ac-6.7
description: Keycloak as an IDM / IAM provider supports least privilege through
user / group management (ABAC / RBAC) service offerings
- uuid: 59032e55-f51e-4a0d-9394-7474631005ec
control-id: ac-6.9
description: Keycloak as an IDM / IAM provider supports least privilege through
user / group management (ABAC / RBAC) service offerings
- uuid: ad95419d-4506-48b0-a736-723724acea34
control-id: ac-6.10
description: Keycloak as an IDM / IAM provider supports least privilege through
user / group management (ABAC / RBAC) service offerings
- uuid: 16088314-7668-41a2-9ee1-a7128d6c209e
control-id: ac-7
description: 'Keycloak has brute force protection which has three components:
max login failures, quick login check (time between failures) & minimum
quick login check wait (time user will be disabled when multiple login failures
are detected)'
- uuid: 35992922-7375-45fc-bac1-1a6b551a76b9
control-id: ac-8
description: Keycloak has a standard DOD login banner see https://login.dso.mil
- uuid: 2a99e48f-6631-4ff7-b955-b73caafdedac
control-id: ac-10
description: Keycloak does not suffice this control natively; however, you
can implement a “only one session per user” behavior with an ```EventListenerProvider```.
On every LOGIN event, delete all the sessions of a user, except the current
one.
- uuid: 77c2aa64-ab6b-4508-b6f6-fcca929de9ab
control-id: ac-12
description: Keycloak does not suffice this control natively; however, you
can implement a session behaviors with an ```EventListenerProvider```.
- uuid: 3b38e765-41f8-4ea6-90dc-b4a1845b62cc
control-id: ac-14
description: Keycloak has the ability to allow anonymous access to resource
if Client Access Type is set to public.
- uuid: 9bd24189-a9f7-4ddb-98fb-ba259b46b459
control-id: ac-17.1
description: Keycloak manages remote access to other applications through
IAM.
- uuid: 3e901895-d5da-48a0-8317-56b456371243
control-id: ac-17.2
description: Through EventListeners Keycloak can either ship logs to a SIEM
which could alert on remote session events, or with custom SPIs Keycloak
can perform an action directly on events. A VPN client would need to use
Keycloak as an SSO to generate these events.
- uuid: 66bc3835-8369-48ec-b54f-ca5ca034e2fd
control-id: ac-17.3
description: Keycloak can restrict access to control points through IAM, but
a VPN solution like Appgate would be better suited working with Keycloak.
- uuid: f6e0f2a4-c729-4335-97f4-b16fb49d27f9
control-id: ac-17.4
description: Keycloak can support a VPN or other remote management system
as its IAM to support remote access control.
- uuid: 6a948220-d3ef-4357-989a-38e25f27eb3f
control-id: au-2
description: Keycloak captures user and admin events and can ship them out
to a logging server for analysis or trigger an action on specific event
via customizable EventListeners.
- uuid: 4b4d19b0-b8e1-4fdd-b57b-448f4e163342
control-id: au-3
description: Keycloak events contain what, when, where, source, and objects/entities
for policy violations.
- uuid: 35b33698-d3c5-496e-9cb4-4524c63e2fac
control-id: au-3.1
description: Keycloak event logs include Time, Event Type, Details (Client,
User, IP Address). Events are shipped to logging.
- uuid: ab565bfa-78a5-43e6-98cc-ba801a16b980
control-id: au-4
description: Keycloak events can be both saved to database and shipped to
logging server. Both systems are external to Keycloaks application server.
- uuid: 24b14c71-b4bd-402f-aba6-80056e1b6fec
control-id: au-7
description: Keycloak provides audit records for compliance that qualify for
this control.
- uuid: e528b2ec-6895-432d-acf1-b33e0f8455f5
control-id: au-7.1
description: Within Keycloak records, sorting and searching are supported.
- uuid: ed7026d7-4257-44e6-919c-73e5f8a86be5
control-id: au-8
description: Keycloak saves timestamps in event logs
- uuid: 92b5e2c1-cb7c-4f38-ba5b-22b617b15020
control-id: au-9
description: Keycloak provides RBAC to restrict management of logs.
- uuid: 71c0d1c7-f9a5-4439-829b-8976749481eb
control-id: au-9.4
description: Keycloak provides RBAC to restrict management of logs.
- uuid: 0b7b466e-e33c-4fa0-8979-a82da5fadc32
control-id: ia-2
description: Keycloak supports control through its IAM/SSO service.
- uuid: ff98831e-de87-4f0d-b42f-3af08a6caff6
control-id: ia-2.1
description: Keycloak supports MFA using mobile and x509 mTLS for both privileged
and non-privileged account management.
- uuid: e0fbd222-d6ae-4729-a262-7c795dd6a628
control-id: ia-2.2
description: Keycloak supports MFA using mobile and x509 mTLS for both privileged
and non-privileged account management.
- uuid: 441d2bbd-b7ee-46e9-8110-f0fda67a2c90
control-id: ia-2.5
description: Keycloak provides build-in functionality to support control.
- uuid: 5c163729-a954-43ca-a035-6040b0526ccd
control-id: ia-2.12
description: Keycloak supports PIV credentials
- uuid: 084779e8-542d-4def-936b-69fd1fb7f266
control-id: ia-3
description: Keycloak provides built-in functionality to support control.
- uuid: 7a4c2837-a205-4b9c-b850-a8afec580275
control-id: ia-4
description: Keycloak provides built-in functionality to support control.
- uuid: ce397926-ec86-491c-82f6-db7e2e164a0d
control-id: ia-4.4
description: Keycloak provides built-in functionality to support control.
- uuid: 7cee87f8-165f-4631-96f5-b2876df0e88a
control-id: ia-5.1
description: Keycloak provides password-policies to support control. https://github.com/keycloak/keycloak-documentation/blob/main/server_admin/topics/authentication/password-policies.adoc
- uuid: 56d5209f-e279-4f67-b6e9-9a814695dda9
control-id: ia-5.2
description: Keycloak supports OCSP checking, and truststore/chain validation
for x509 PKI access.
- uuid: 8d858e85-710e-46aa-b6fd-98013480c2b6
control-id: ia-8.1
description: Keycloak supports authenicating non-orgaizational users through
supporting mTLS signed by external certificate authorities.
- uuid: c2976939-842a-4efc-afd3-11dc9892fb86
control-id: ia-11
description: Keycloak supports OIDC/SAML which support expiration dates in
tokens/assertions.
back-matter:
resources:
- uuid: C322D234-BD2A-4332-B8A9-54D45E7148B8
title: Big Bang
rlinks:
- href: https://repo1.dso.mil/platform-one/big-bang/bigbang