Keycloak does not run in isolation. The moment you deploy it, you rely on an ecosystem of sub-processors—services and vendors that handle, store, or process user data as part of authentication flows. Understanding these Keycloak sub-processors is essential for maintaining security, privacy, and compliance across your identity stack.
A sub-processor is any third party that processes personal data on behalf of the processor. In a Keycloak setup, this can include cloud providers, monitoring tools, logging systems, analytics services, email gateways, or SMS providers for multi-factor authentication. Each component that touches account data becomes part of your compliance scope under regulations like GDPR and CCPA.
Self-hosted Keycloak clusters often involve infrastructure-level sub-processors such as AWS, GCP, or Azure. These handle database storage, virtual machines, and network transport. Beyond infrastructure, engineers integrate Keycloak with services like Twilio for OTP delivery, SendGrid for transactional emails, or centralized logging stacks that store user event data. Even telemetry tools can become sub-processors if they collect or process identifiable information.