In this chapter, you were presented with one of the main aspects of Keycloak: extensibility. You learned that Keycloak not only helps you to deploy IAM to your ecosystem, but also to adapt IAM to your needs.
For that, you were provided with the basics of how to change the look and feel of the server using themes and how to implement custom providers using some of the available SPIs. Although you were presented with only a few examples about how to extend Keycloak, you should be able to leverage what you learned from this chapter to extend Keycloak using any SPI.
In the next chapter, you will be looking at some security best practices and considerations when using Keyloak.