📄️ 4.2 Keycloak
Keycloak is used for identity and access management in the complete stack. To access data or use endpoints, a user must to obtain an access token from Keycloak and
📄️ 4.3 Compatibility
Following table contains versions of 3rd party software compatible with the .