Architecture
Three deployment modes for every security requirement — from single-binary evaluation to full 4-process isolation.
Deployment Modes
Mini
Single Binary
All 4 pipeline stages run in one process with in-memory DirectMessageTransport. No external dependencies.
- 1 process
- In-memory transport
- No NATS/Valkey needed
- Ideal for evaluation and edge deployments
Small
2 Processes
Frontend + Backend communicate via NATS or Valkey. Request and response validators run in-process with their hosts.
- 2 processes, 2 isolated networks
- NATS or Valkey transport
- Standard network isolation
- Ideal for small teams
Full
4 Processes
Maximum isolation: Frontend, Request Validator, Backend, and Response Validator each run in separate networks.
- 4 processes, 4 isolated networks
- 4 dedicated NATS/Valkey instances
- Strong network isolation
- Enterprise-grade security
Identical Behavior Across All Modes
Validation logic, policy decisions, and error responses are bit-for-bit identical regardless of deployment mode. The transport layer is the only difference.
Request Validation Pipeline (16 Steps)
- HTTP-level security checks (SQLi, XSS, path traversal)
- Realm validation (whitelist enforcement)
- Client ID validation
- Blocked path check
- CIBA grant type denial
- Flow profile enforcement
- Flow-specific validation (authorization/token/refresh)
- Token-in-URL detection
- Grant type validation (per-client)
- Scope validation (per-client whitelist)
- Redirect URI validation (whitelist + SSRF)
- PKCE enforcement (S256)
- State/nonce parameter check
- Admin API endpoint whitelist
- SAML validation (XXE, signature wrapping)
- HTTP base security (smuggling, injection)
Response Validation Pipeline (9 Steps)
- Token-in-URL fragment detection
- Token structure validation (JWT format)
- Refresh token in body check
- JWT claim allowlist enforcement
- Discovery document validation
- JWKS response inspection (RSA key size, algorithms)
- Claim value inspection (size limits)
- Realm/role claims inspection
- JWE/opaque token handling
Keycloak Operation Recognition
The gateway classifies every request by HTTP method, path, and query parameters.
OIDC Protocol
- Token Request / Refresh
- Authorization Request
- UserInfo, Introspection, Revocation
- Device Authorization
- End Session, JWKS
SAML Protocol
- AuthnRequest / Response
- Logout Request
- Metadata Endpoint
- Artifact Resolve
Admin API
- Realm CRUD + Export
- User Management (CRUD, roles, sessions)
- Client Management
- Identity Provider Configuration
- Auth Flows, Roles, Groups, Events