Authenticate Users Through Legacy IAM Without Migration
Enable Keycloak to accept user credentials from existing enterprise IAM systems. This extension provides a secure, session-aware authenticator that communicates with the legacy identity proxy—ensuring backward compatibility and zero-friction login.
Seamless User Login via Legacy Identity Systems
Why It Matters
Enterprise IAM transitions often involve years of embedded legacy systems. Instead of forcing all applications to migrate at once, this authenticator supports:
- Parallel IAM operation during migration
- Passwordless login via external identity proxy
- Progressive user onboarding into Keycloak
- Consistent token issuance and session management
By acting as a secure handshake between Keycloak and your legacy IAM, this extension delivers seamless login with minimal risk and maximum continuity.
Bridge Your Old IAM and Keycloak Without Breaking Users
Keycloak communicates with the legacy IAM proxy at login time:
Legacy IAM Authentication Flow
This flow enables "parallel run" without requiring applications to change their login logic.
Example: Keycloak acts as a bridge to your existing identity systems.
Key Components:
Extension Highlights — What Makes It Unique
External Credential Validation
Sends credentials securely to a legacy identity validation endpoint
User Auto-Creation in Keycloak
New users are created automatically upon first successful login
Legacy Token Linking (Optional)
Stores external IAM token or session ID in Keycloak session notes
Customizable Username Field
Supports login with username, TCKN, or custom identifiers
No Password Storage in Keycloak
Passwords never stored—proxy remains source of truth
Full Session Control
Keycloak controls the access token, session state, and logout behavior
Ideal for Parallel Migration
No need to force app-side changes while migrating IAM systems
Frequently Asked Questions
How to Use This Extension
Follow these steps to enable the External IAM Login Authenticator.