Keycloak Interview Question-Answer

Q.1 Which of the following standard protocols does Keycloak Support?

       A. Oauth 2.0

       B. OpenID Connect

       C. SAML

       D. All the options

Ans : All the options


Q.2 Which of the following is a benefit of Identity and Access Management?

       A. Improves Security

       B. Manages Risks

       C. Meet Compliance goals

       D. Reach business objectives

       E. Improves Productivity

       F. All the options

Ans : All the options


Q.3 A __________ defines the conditions that must be satisfied to grant access to an object.

       A. Scope

       B. Policy

       C. Permission

Ans : Policy


Q.4 Keycloak is an Identity Provider (IDP).

       A. True

       B. False

Ans : True


Q.5 Keycloak can only be used to authenticate applications and not individual users.

       A. True

       B. False

Ans : False


Q.6 The feature of logging into social networks can be facilitated using Keycloak.

       A. True

       B. False

Ans : True


Q.7 Master realms are usually reserved for super administrators for creating and managing the realms in a system.

       A. True

       B. False

Ans : True


Q.8 Admin accounts created in the master realm have permissions to view and manage any other realm created on the server instance.

       A. True

       B. False

Ans : True


Q.9 A/An ________ token contains information about user role mapping.

       A. Identity

       B. Utility

       C. User

       D. Access

Ans : Access


Q.10 SAML 2.0 works by exchanging ___________ between the application and the authentication server.

       A. Authentication Tokens

       B. HTML Documents

       C. XML Documents

       D. Authorization Tokens

Ans : XML Documents


Q.11 What is the highest level in the hierarchy of realms?

       A. User realm

       B. admin realm

       C. Master realm

       D. Root realm

Ans : Master realm


Q.12 Verifying the identity of an entity to allow access to a resource is known as __________.

       A. Identity Management

       B. Authentication

       C. Authorization

Ans : Authentication


Q.13 ____________ identify/identifies the type or category of a user.

       A. Roles

       B. Identity

       C. Realm

       D. Tokens

Ans : Roles


Q.14 A user can be allocated to only one role.

       A. True

       B. False

Ans : False


Q.15 ________ protocol is more suited to work with HTML5/Javascript applications due to ease of implementation.

       A. SAML

       B. OpenID Connect

Ans : OpenID Connect


Q.16 The ________ contains information about the user, such as username and email.

       A. Utility token

       B. Identity token

       C. Access token

       D. Asset token

Ans : Identity token


Q.17 Which among the following protocols has its roots in SOAP and WS-Specifications?

       A. OpenID Connect

       B. Oauth 2.0

       C. SAML 2.0

Ans : SAML 2.0


Q.18 The process of granting access privileges to a user/program is known as ____________.

       A. Authentication

       B. Identity Management

       C. Authorization

Ans : Authorization


Q.19 The entities that request Keycloak to authenticate a user are called as ____________.

       A. Processes

       B. Servers

       C. Clients

Ans : Clients


Q.20 Which among the following is the full-fledged authentication and authorization protocol?

       A. Oauth 2.0

       B. OpenID Connect

Ans : OpenID Connect


Leave a Comment