Skip to main content

Core Capabilities

Summary

Keymate provides over 50 capabilities organized into seven categories. Each category addresses a distinct aspect of enterprise access governance, from fine-grained authorization models to deployment flexibility and compliance observability. Together, they form a comprehensive platform that extends Keycloak into a full access governance solution.

Why It Exists

Native Keycloak provides strong authentication and basic RBAC, but enterprise environments need more: contextual authorization, tenant-aware isolation, policy lifecycle management, edge enforcement, and deep observability. Keymate fills these gaps without requiring a platform replacement.

How It Works

Advanced Authorization

The authorization engine supports multiple access control models that can be composed together using policy aggregation strategies.

CapabilityDescription
Role-Based Access Control (RBAC)Scoped, tenant-aware role assignments with delegated management and real-time enforcement
Attribute-Based Access Control (ABAC)Context-aware policies using user, resource, and environmental attributes (region, department, time)
Relationship-Based Access Control (ReBAC)Graph-based access using entity relationships (owner, collaborator, manager) via the FGA engine
Risk-Adaptive Access Control (RADAC)Dynamic decisions based on risk signals such as device posture, geolocation, and behavioral anomalies
Data Security Attribute Control (DSAC)Fine-grained access based on data sensitivity classification and compliance tags
Policy-Based Access Control (PBAC)Compose sub-policies using decision strategies: unanimous, affirmative, or consensus
Visual Policy SimulationSimulate and trace access decisions with dry-run tools before deployment
Dual-Mode Policy DefinitionAuthor policies visually (form UI) or in DSL code. Both modes stay in sync
Policy Lifecycle ManagementVersion, diff, review, approve, test, and roll back policies like software artifacts
Just-in-Time Role ElevationDynamic privilege elevation with time-bounded access and approval workflows
Why-Denied AnalysisFull visibility into every authorization decision. Shows failed conditions and missing attributes
Contextual Access ControlAuthorization decisions that consider session context, token claims, and organizational structure
JavaScript Access PoliciesDynamic policies powered by custom JavaScript logic for complex business rules

Organization Management

Native multi-tenancy support with organizational hierarchy, delegation, and tenant-aware token enrichment.

CapabilityDescription
Multi-Tenant IAMTrue tenant isolation. Each tenant gets isolated org units, policies, user bases, and delegated admins
Delegated AdministrationAllow each tenant to manage its own users, roles, and org units within scoped, auditable boundaries
Org-Aware Token EnrichmentEnrich identity tokens with organizational context (department, unit, title, session role) for scoped decisions
Organization Lifecycle ManagementCentralized control over the lifecycle of organizations, departments, and units

Resource Modeling

Tools for defining, importing, and managing the resources and scopes that policies protect.

CapabilityDescription
Swagger-Driven ImportAuto-generate API resources and scopes from OpenAPI definitions
Bulk Policy and Resource ImportUpload policies and resources at scale with JSON or CSV
Policy TemplatesDefine once, reuse everywhere with parameterized policy templates
Metadata-Driven AuthorizationUse column-level metadata from the metadata catalog to drive fine-grained API authorization

Integration

Connect Keymate to your existing infrastructure without application code changes.

CapabilityDescription
API Gateway PluginsNative API gateway plugins to enforce access control at the edge. No app code required
Service Mesh FiltersService mesh and sidecar proxy integration for fine-grained access across service-to-service traffic
FGA Engine BackendManaged FGA engine deployment as a dedicated relationship-based authorization backend
Risk and HRMS EnrichmentEnrich session tokens with dynamic signals from external risk engines and HRMS platforms
Delegation and Leave EventsReact to real-time HRMS events for delegation and leave, automatically adjusting permissions
Parallel IAM MigrationSafe, staged migration from legacy IAM by operating in parallel mode with token exchange
Event Subscription APIDual-mode (gRPC/REST) API for external systems to stream data into Keymate

Compliance and Observability

Full auditability and observability across every authorization decision.

CapabilityDescription
OpenTelemetry IntegrationNative instrumentation with the observability backend for end-to-end observability across auth and event pipelines
Audit LoggingComprehensive, structured, queryable logs for compliance, forensics, and operational monitoring
Regulatory ComplianceBuilt-in privacy and security controls aligned with KVKK, GDPR, and ISO 27001
Access Decision StreamingStream every access decision into an event bus pipeline in real time
Central Audit ServerImmutable, tenant-aware, and fully traceable audit logging
Keycloak Extended LoggingTelemetry-ready, policy-aware, multi-tenant logging for IAM core

Deployment

Flexible deployment options from managed SaaS to air-gapped on-premises installations.

CapabilityDescription
Kubernetes and HelmGitOps-friendly deployment on any Kubernetes cluster
Air-Gapped and Self-HostedIAM that works in offline, highly regulated, and zero-trust environments
VPC and Private CloudDedicated deployments fully isolated within your own cloud network
Managed SaaSFully isolated, SLA-backed IAM hosting delivered as a hard-tenant cloud service
Environment ManagementPromote, isolate, and govern IAM across dev, test, and production environments

Platform

Administrative tools and developer experience for managing the entire access governance lifecycle.

CapabilityDescription
Admin ConsoleCentralized, secure, tenant-aware UI for IAM governance
Frontend FrameworkReact/Next.js framework optimized for secure, scalable IAM admin interfaces
Policy Expression EditorAdvanced expression editor with real-time syntax validation and autocomplete
Customizable Admin ModulesModular console components for tenant-specific governance needs

Example Scenario

Scenario

An architect evaluating Keymate needs to understand how capabilities work together for a B2B2C fintech platform.

How Capabilities Compose

  1. Organization Management sets up tenant isolation for each partner bank
  2. RBAC + ABAC defines scoped roles enriched with attributes (region, data classification)
  3. ReBAC via the FGA engine models document ownership and collaboration relationships
  4. RADAC adds risk-adaptive controls for sensitive operations (payment approvals)
  5. API Gateway Plugin enforces decisions at the edge without app code changes
  6. Policy Simulation lets the team test new policies before production deployment
  7. OpenTelemetry + Audit Logging provides full observability and compliance evidence