Using Keycloak

Once you have finished configuring Keycloak, you’re ready to add roles, optional groups, users, and service accounts into it to be used for authentication to Keyfactor Command.

Note:  You can grant access to Keyfactor Command on a user-by-user basis rather than with roles, but the management overhead of this method is much greater. Keyfactor recommends using roles.