The server room was silent except for the hum of machines not connected to the outside world. That’s the point. No internet. No leaks. No risks. An air-gapped deployment of Keycloak gives you control at the cost of convenience—unless you know exactly how to set it up.
Air-gapped Keycloak means installing and running Keycloak in a network completely cut off from public access. It’s used in environments where security rules ban external communication. Government, defense, finance, critical infrastructure—anywhere a single packet flowing out could mean disaster.
The challenge starts with dependencies. Keycloak requires Java, a database, and supporting libraries. In an air-gapped setup, you can’t pull them from public repositories. You prepare everything offsite. You download the Keycloak distribution, plugins, and Identity Provider configurations ahead of time. You verify checksums. You store them on verified storage media. Then you bring them inside the secured network.
Once inside, the installation is straightforward but manual. You run Keycloak either in standalone mode or in containers using an internal container registry. If you use Docker or Podman, all images must be mirrored internally. That means exporting them from a connected machine and importing them inside the gap. Your internal build pipelines replace public registries with private, locked-down ones.