II.
StackProfile JSON
Structured · livestack-profile:identity-governance
Identity Governance (Keycloak, PostgreSQL, React, Go, Docker) json
Inspect the normalized record payload exactly as the atlas UI reads it.
{
"id": "stack-profile:identity-governance",
"_kind": "StackProfile",
"_file": "domain/stack-profiles/deep-stacks-6.yaml",
"_cluster": "domain",
"attributes": {
"displayName": "Identity Governance (Keycloak, PostgreSQL, React, Go, Docker)",
"description": "An identity governance and administration platform managing user\nlifecycle, access certifications, and privilege reviews across the\norganization. Keycloak provides the identity provider with SAML,\nOIDC, and LDAP federation supporting thousands of enterprise\napplications. Go microservices implement access certification campaigns,\nrole mining algorithms, and segregation-of-duties policy enforcement.\nPostgreSQL stores identity records, entitlement catalogs, certification\ndecisions, and audit logs with temporal tables for historical queries.\nReact powers the admin console with organizational hierarchy views,\naccess request workflows, and certification campaign dashboards.\nDocker containers ensure consistent deployment across identity zones.\nThe tradeoff is maintaining accurate role definitions as the\norganization evolves and the performance impact of evaluating\ncomplex entitlement policies at authentication time.\n",
"composes": [
"tool:keycloak",
"tool:psql",
"framework:react",
"language:go",
"tool:docker",
"library:chi",
"library:zerolog",
"library:tailwindcss"
]
},
"outgoingEdges": [
{
"from": "stack-profile:identity-governance",
"to": "tool:keycloak",
"kind": "composed_of"
},
{
"from": "stack-profile:identity-governance",
"to": "tool:psql",
"kind": "composed_of"
},
{
"from": "stack-profile:identity-governance",
"to": "framework:react",
"kind": "composed_of"
},
{
"from": "stack-profile:identity-governance",
"to": "language:go",
"kind": "composed_of"
},
{
"from": "stack-profile:identity-governance",
"to": "tool:docker",
"kind": "composed_of"
},
{
"from": "stack-profile:identity-governance",
"to": "library:chi",
"kind": "composed_of"
},
{
"from": "stack-profile:identity-governance",
"to": "library:zerolog",
"kind": "composed_of"
},
{
"from": "stack-profile:identity-governance",
"to": "library:tailwindcss",
"kind": "composed_of"
},
{
"from": "stack-profile:identity-governance",
"to": "role:security-engineer",
"kind": "used_by_role"
},
{
"from": "stack-profile:identity-governance",
"to": "role:backend-engineer",
"kind": "used_by_role"
},
{
"from": "stack-profile:identity-governance",
"to": "role:compliance-engineer",
"kind": "used_by_role"
},
{
"from": "stack-profile:identity-governance",
"to": "workflow:access-review",
"kind": "follows_workflow"
},
{
"from": "stack-profile:identity-governance",
"to": "workflow:access-control-audit",
"kind": "follows_workflow"
},
{
"from": "stack-profile:identity-governance",
"to": "domain:cybersecurity",
"kind": "applies_to"
},
{
"from": "stack-profile:identity-governance",
"to": "domain:compliance",
"kind": "applies_to"
},
{
"from": "stack-profile:identity-governance",
"to": "skill-area:identity-security",
"kind": "requires_skill_area"
},
{
"from": "stack-profile:identity-governance",
"to": "skill-area:authentication-authorization",
"kind": "requires_skill_area"
},
{
"from": "stack-profile:identity-governance",
"to": "skill-area:access-control",
"kind": "requires_skill_area"
},
{
"from": "stack-profile:identity-governance",
"to": "skill-area:backend-data-persistence",
"kind": "requires_skill_area"
},
{
"from": "stack-profile:identity-governance",
"to": "skill-area:compliance-automation",
"kind": "requires_skill_area"
}
],
"incomingEdges": []
}