In the previous chapters, you were basically using passwords to authenticate users. You were also quickly introduced to how to set up passwords when managing users. In this section, we are going to look closer at how password-based authentication works and how passwords are managed.
We are not going to cover how users authenticate using passwords here because you are already familiar with that, but we will be covering additional details around this form of authentication.
Password-based authentication is probably one of the most popular methods for authenticating users. It is easy to implement and is what most end users are used to when they need to authenticate into a system. However, the simplicity of this credential type has some disadvantages and weaknesses, all of which we will cover later in this section.
To help us overcome some of the disadvantages of password-based authentication, Keycloak relies on common best practices to make sure passwords...