AI Buyer Insights:

Swedbank, a Temenos T24 customer evaluated Oracle Flexcube

Citigroup, a VestmarkONE customer evaluated BlackRock Aladdin Wealth

Cantor Fitzgerald, a Kyriba Treasury customer evaluated GTreasury

Moog, an UKG AutoTime customer evaluated Workday Time and Attendance

Wayfair, a Korber HighJump WMS customer just evaluated Manhattan WMS

Westpac NZ, an Infosys Finacle customer evaluated nCino Bank OS

Michelin, an e2open customer evaluated Oracle Transportation Management

Swedbank, a Temenos T24 customer evaluated Oracle Flexcube

Citigroup, a VestmarkONE customer evaluated BlackRock Aladdin Wealth

Cantor Fitzgerald, a Kyriba Treasury customer evaluated GTreasury

Moog, an UKG AutoTime customer evaluated Workday Time and Attendance

Wayfair, a Korber HighJump WMS customer just evaluated Manhattan WMS

Westpac NZ, an Infosys Finacle customer evaluated nCino Bank OS

Michelin, an e2open customer evaluated Oracle Transportation Management

List of Red Hat Keycloak Customers

Apply Filters For Customers

Logo Customer Industry Empl. Revenue Country Vendor Application Category When SI Insight
Cern Non Profit 2500 $600M Switzerland Red Hat Red Hat Keycloak Identity and Access Management (IAM) 2019 n/a
In 2019, CERN implemented Red Hat Keycloak as its centralized Single Sign-On and authorization service to secure laboratory applications and provide federated authentication across the organisation in Europe. The deployment is categorized as Identity and Access Management (IAM), and Red Hat Keycloak functions as the institutional identity broker for CERN services. The implementation centered on explicit SSO and 2FA modules, with Keycloak configured to manage authentication and authorization flows across CERN applications. CERN documentation references use of SSO and two factor authentication modules and policy based access controls, aligning the configuration with common Identity and Access Management (IAM) workflows such as token based authentication and centralized session management. The Keycloak deployment replaced ADFS for Single Sign-On, enabling federated authentication across CERN services and laboratory systems. Operational coverage included IT managed services responsible for SSO, authentication and authorization across research and administrative applications throughout the organisation in Europe, with integrations focused on service endpoints within CERN infrastructure to create a single authentication plane. Governance and rollout emphasized centralizing authentication policy and consolidating SSO and 2FA enforcement under a single IAM platform, using CERN authentication documentation as the operational reference for administrators. The programme formalized authentication workflows and centralized access control for laboratory and IT services, standardizing how applications at CERN handle user identity and authorization.
CI Banco Banking and Financial Services 3000 $1.2B Mexico Red Hat Red Hat Keycloak Identity and Access Management (IAM) 2016 n/a
In 2016 CI Banco implemented Red Hat Keycloak as its Identity and Access Management (IAM) solution. The deployment positioned Red Hat Keycloak as the central identity provider to support authentication, session management and token services for the bank's Java-based web applications and backend services. Keycloak was instrumented alongside a custom security library built with Spring Security to externalize authentication and enforce role based access controls. The implementation supported token lifecycle management and federation capabilities that were used in concert with the Token Management System, Gemalto Tokens API and PROSA API for file tokenization and detokenization. Operational integration extended to console and middleware components, including SOAP clients used for transactional email and blacklist queries, and TIBCO BW6 services that expose and consume internal web services. Directory integration was explicit, with LDAP Active Directory serving as the primary user store and authentication backend for Red Hat Keycloak derived flows. Governance and run book responsibilities were retained by CI Banco development and support teams, with the security library and Keycloak configuration embedded into application development patterns. Ongoing application support and security maintenance were executed through these internal teams to ensure consistent authentication, authorization and token handling across banking functions.
Cisco Systems Professional Services 90400 $53.8B United States Red Hat Red Hat Keycloak Identity and Access Management (IAM) 2018 n/a
In 2018, Cisco Systems deployed Red Hat Keycloak for Identity and Access Management (IAM). The CNCF summary identifies Cisco among organizations running Keycloak in production to provide authentication and authorization to secure applications and APIs across its global and US operations. The implementation functions as a centralized identity provider to enforce authentication and authorization policies for internal and customer facing services. Functional capabilities implemented include single sign on, API protection via OAuth2 and OpenID Connect, federated identity support for enterprise directories, and role based access control, inferred from typical Red Hat Keycloak usage patterns described in the source. Architecturally, the Red Hat Keycloak deployment aligns with category conventions, operating as a scalable, cluster ready identity layer that issues tokens and integrates with application authentication flows and API protection tiers. Governance centered on centralized policy management and user federation to streamline access management across business functions such as application security and platform engineering.
Hitachi Systems Professional Services 282743 $67.3B Japan Red Hat Red Hat Keycloak Identity and Access Management (IAM) 2023 n/a
In 2023, Hitachi Systems deployed Red Hat Keycloak as part of its Identity and Access Management (IAM) footprint, using the solution for enterprise identity and API security across global projects. The vendor documentation and Hitachi publications identify Hitachi as a maintainer and contributor to Red Hat Keycloak and state production use for single sign on and API protection. Implementation work focused on core authentication and authorization services, single sign on integrations, and API protection capabilities, aligning with typical Keycloak functional modules such as identity federation, realm and client configuration, token issuance, and authorization policy enforcement. Configuration included realm segmentation for project boundaries, centralized identity providers for SSO, and policy driven access controls to secure APIs. Operationally, Red Hat Keycloak is applied across APAC and global project landscapes to provide unified authentication and authorization for web and API surfaces, with integration patterns that connect application clients to Keycloak for token based access and SSO flows. Hitachi Systems contribution activity implies an operational model that includes running production Keycloak clusters, contributing code or extensions upstream, and coordinating security updates with Red Hat. Governance for the deployment emphasizes contributor based release management and centralized identity governance, with internal teams responsible for configuration standards, onboarding processes for new applications, and coordinated upstream contributions that feed back into Red Hat Keycloak development. The narrative published by Hitachi confirms production grade use for SSO and API security, positioning Red Hat Keycloak as a foundational Identity and Access Management (IAM) platform within Hitachi Systems.
Showing 1 to 4 of 4 entries

Buyer Intent: Companies Evaluating Red Hat Keycloak

ARTW Buyer Intent uncovers actionable customer signals, identifying software buyers actively evaluating Red Hat Keycloak. Gain ongoing access to real-time prospects and uncover hidden opportunities. Companies Actively Evaluating Red Hat Keycloak for Identity and Access Management (IAM) include:

  1. Viaccess-Orca, a France based Media organization with 270 Employees
  2. E.Sun Bank, a Taiwan based Banking and Financial Services company with 8421 Employees
  3. Fnmt-Rcm, a Spain based Professional Services organization with 1217 Employees

Discover Software Buyers actively Evaluating Enterprise Applications

Logo Company Industry Employees Revenue Country Evaluated
No data found
FAQ - APPS RUN THE WORLD Red Hat Keycloak Coverage

Red Hat Keycloak is a Identity and Access Management (IAM) solution from Red Hat.

Companies worldwide use Red Hat Keycloak, from small firms to large enterprises across 21+ industries.

Organizations such as Hitachi Systems, Cisco Systems, CI Banco and Cern are recorded users of Red Hat Keycloak for Identity and Access Management (IAM).

Companies using Red Hat Keycloak are most concentrated in Professional Services, Banking and Financial Services and Non Profit, with adoption spanning over 21 industries.

Companies using Red Hat Keycloak are most concentrated in Japan, United States and Mexico, with adoption tracked across 195 countries worldwide. This global distribution highlights the popularity of Red Hat Keycloak across Americas, EMEA, and APAC.

Companies using Red Hat Keycloak range from small businesses with 0-100 employees - 0%, to mid-sized firms with 101-1,000 employees - 0%, large organizations with 1,001-10,000 employees - 50%, and global enterprises with 10,000+ employees - 50%.

Customers of Red Hat Keycloak include firms across all revenue levels — from $0-100M, to $101M-$1B, $1B-$10B, and $10B+ global corporations.

Contact APPS RUN THE WORLD to access the full verified Red Hat Keycloak customer database with detailed Firmographics such as industry, geography, revenue, and employee breakdowns as well as key decision makers in charge of Identity and Access Management (IAM).