Listing Thumbnail

    Keycloak - Supported and Secured by the Hossted Platform

     Info
    Sold by: Hossted 
    Deployed on AWS
    This product has charges associated with it for seller support. Hossted Platform offers an intuitive dashboard and CLI that delivers comprehensive security, monitoring, logging, and applicative insights.

    Overview

    This is a repackaged open-source software product wherein additional charges apply for supplementary services.

    Deploy Keycloak on AWS with our Virtual Machine solution, optimized to enhance performance, security, and scalability in your AWS Virtual Machine environment. This solution ensures your applications run seamlessly, harnessing AWS robust cloud capabilities.

    Sign up to the Hossted Dashboard  and get started in minutes with seamless onboarding and automated setup for all your applications.

    Why Hossted on AWS?

    • Application Platform: Hossted intuitive Platform enables you to easily manage your applications. Monitor application performance, detect CVEs, and secure your system from vulnerabilities effortlessly.

    • Instant Deployment: Hossted offers a streamlined solution for deploying Keycloak in less than 5 minutes. Experience the simplicity in our attached video.

    • 24/7 Support: Enjoy round-the-clock support from our dedicated team, ensuring your applications run smoothly and efficiently in your AWS environment without disruptions.

    • Troubleshooting Expertise: Our experienced support team is ready to help identify and resolve issues, keeping your application operating efficiently on AWS.

    • Advanced Security Measures: Hossted enhances Keycloak security with best practices, built-in SSL, secure access, and guidelines for routine image updates. It ensures top-tier protection through regular scans and updates, boosting application safety levels.

    Learn More
    Visit us at  https://hossted.com  or schedule a quick chat with our team at  https://cal.hossted.com/team/csm/onboarding/ . We are here to assist with Keycloak or any other open-source solutions.

    Transform your IT infrastructure with Hossted on AWS!

    Experience unmatched efficiency, security, and control with our solution on AWS VMs. Discover the future of application deployment in the AWS cloud today!

    Highlights

    • Simplify Keycloak management and maintenance with the powerful Hossted Platform.
    • Gain real-time monitoring and detailed analytics to ensure your Keycloak system stays secure and responsive.
    • Manage Keycloak and other open-source applications with a unified dashboard - monitor health metrics, track performance, and access expert support in one place.

    Details

    Sold by

    Delivery method

    Delivery option
    64-bit (x86) Amazon Machine Image (AMI)

    Latest version

    Operating system
    Ubuntu 22.04

    Deployed on AWS
    New

    Introducing multi-product solutions

    You can now purchase comprehensive solutions tailored to use cases and industries.

    Multi-product solutions

    Features and programs

    Financing for AWS Marketplace purchases

    AWS Marketplace now accepts line of credit payments through the PNC Vendor Finance program. This program is available to select AWS customers in the US, excluding NV, NC, ND, TN, & VT.
    Financing for AWS Marketplace purchases

    Pricing

    Keycloak - Supported and Secured by the Hossted Platform

     Info
    Pricing is based on actual usage, with charges varying according to how much you consume. Subscriptions have no end date and may be canceled any time. Alternatively, you can pay upfront for a contract, which typically covers your anticipated usage for the contract duration. Any usage beyond contract will incur additional usage-based costs.
    Additional AWS infrastructure costs may apply. Use the AWS Pricing Calculator  to estimate your infrastructure costs.

    Usage costs (22)

     Info
    Dimension
    Cost/hour
    t3.large
    Recommended
    $0.14
    t3a.medium
    $0.14
    t2.2xlarge
    $0.14
    t2.medium
    $0.14
    t3.medium
    $0.14
    t3.2xlarge
    $0.14
    m4.10xlarge
    $0.14
    t3a.2xlarge
    $0.14
    m3.xlarge
    $0.14
    t2.large
    $0.14

    Vendor refund policy

    Per purchased plan

    How can we make this page better?

    We'd like to hear your feedback and ideas on how to improve this page.
    We'd like to hear your feedback and ideas on how to improve this page.

    Legal

    Vendor terms and conditions

    Upon subscribing to this product, you must acknowledge and agree to the terms and conditions outlined in the vendor's End User License Agreement (EULA) .

    Content disclaimer

    Vendors are responsible for their product descriptions and other product content. AWS does not warrant that vendors' product descriptions or other product content are accurate, complete, reliable, current, or error-free.

    Usage information

     Info

    Delivery details

    64-bit (x86) Amazon Machine Image (AMI)

    Amazon Machine Image (AMI)

    An AMI is a virtual image that provides the information required to launch an instance. Amazon EC2 (Elastic Compute Cloud) instances are virtual servers on which you can run your applications and workloads, offering varying combinations of CPU, memory, storage, and networking resources. You can launch as many instances from as many different AMIs as you need.

    Version release notes

    bugfixed

    Additional details

    Usage instructions

    After deployment, you can access your application at http://<public IP>. (It might take up to 15 minutes to be available post-deployment). The machine is accessible via SSH, default username: ubuntu. Where relevant, app login credentials are available on message of the day (and /etc/motd).

    Support

    Vendor support

    AWS infrastructure support

    AWS Support is a one-on-one, fast-response support channel that is staffed 24x7x365 with experienced and technical support engineers. The service helps customers of all sizes and technical abilities to successfully utilize the products and features provided by Amazon Web Services.

    Product comparison

     Info
    Updated weekly

    Accolades

     Info
    Top
    10
    In Security Observability

    Customer reviews

     Info
    Sentiment is AI generated from actual customer reviews on AWS and G2
    Reviews
    Functionality
    Ease of use
    Customer service
    Cost effectiveness
    0 reviews
    Insufficient data
    Insufficient data
    Insufficient data
    Insufficient data
    0 reviews
    Insufficient data
    Insufficient data
    Insufficient data
    Insufficient data
    Positive reviews
    Mixed reviews
    Negative reviews

    Overview

     Info
    AI generated from product descriptions
    Identity and Access Management
    Keycloak deployment on AWS Virtual Machine environment for managing application authentication and authorization
    Real-time Monitoring and Analytics
    Real-time monitoring and detailed analytics capabilities to track system performance and security status
    Unified Management Dashboard
    Intuitive dashboard and CLI interface for managing applications, monitoring health metrics, and tracking performance across multiple open-source applications
    Security Hardening
    Built-in SSL, secure access controls, regular vulnerability scans, CVE detection, and routine image updates for enhanced application protection
    Rapid Deployment
    Streamlined deployment solution enabling Keycloak setup in less than 5 minutes with automated configuration
    Vulnerability Scanning Capabilities
    Supports both unauthenticated and authenticated scans across various high-level and low-level internet and industrial protocols
    Host Intrusion Detection System
    OSSEC HIDS for intrusion detection integrated with Debian 12 infrastructure
    Audit Logging and System Monitoring
    Rsyslog for audit logging and Auditd for system monitoring with UFW firewall restrictions
    Vulnerability Feed Updates
    Daily updates to vulnerability feeds ensuring protection against latest threats
    API Integration
    Integration with other security tools via API for centralized vulnerability management
    Vulnerability Scanning
    Industry-standard, open-source vulnerability scanning capabilities for identifying security weaknesses
    Continuous Monitoring
    24x7 alerts and detection system for real-time security vulnerability identification
    Automated Change Detection
    Automated alerting mechanism triggered when configuration or security status changes
    AWS Resource Integration
    Automated import functionality for AWS resources including EC2, Lightsail, and Route53 with read-only access
    Target Management
    Manual and automatic target list management for servers and endpoints

    Contract

     Info
    Standard contract
    No

    Customer reviews

    Ratings and reviews

     Info
    0 ratings
    5 star
    4 star
    3 star
    2 star
    1 star
    0%
    0%
    0%
    0%
    0%
    0 reviews
    No customer reviews yet
    Be the first to review this product . We've partnered with PeerSpot to gather customer feedback. You can share your experience by writing or recording a review, or scheduling a call with a PeerSpot analyst.