Alexander Schwartz

Delegating the chores of authenticating users to Keycloak

Stop building user authentication. Learn how to delegate the chores of registration, password resets, and session management to Keycloak and focus on your core application.

Delegating the chores of authenticating users to Keycloak
#1about 3 minutes

Understanding the complexities of modern user authentication

Delegating authentication is necessary because it involves more than just a login form, including registration, password recovery, and multi-factor authentication.

#2about 2 minutes

Introducing the key players in an OIDC ecosystem

The OpenID Connect architecture consists of three main actors: the end-user, the OpenID Provider like Keycloak, and the client application or relying party.

#3about 6 minutes

Using OIDC prompts for different user actions

Applications can use specific OIDC prompt parameters to check login status, initiate user registration, or trigger a standard login.

#4about 3 minutes

Handling session state, tokens, and user information

OpenID Connect provides standard endpoints and flows for checking session status with iframes, refreshing expired tokens, fetching user data, and securely logging out.

#5about 1 minute

Implementing step-up authentication for sensitive actions

Use Authentication Context Class Reference (ACR) values to request a higher level of assurance, such as a second factor, for critical operations.

#6about 3 minutes

Leveraging Keycloak's application-initiated actions

Keycloak's application-initiated actions allow you to redirect users to specific pages for tasks like updating their profile, changing a password, or verifying an email address.

#7about 2 minutes

Configuring user profiles for incremental data collection

Keycloak's user profile feature enables defining custom user attributes and using scopes to implement incremental profiling, collecting data only when an application requires it.

#8about 3 minutes

Customizing login flows and exploring further capabilities

Beyond standard authentication, Keycloak allows for customizing login flows to restrict client access and provides built-in support for features like password resets and remember me.

Related jobs
Jobs that call for the skills explored in this talk.

Featured Partners

Related Articles

View all articles
CH
Chris Heilmann
With AIs wide open - WeAreDevelopers at All Things Open 2025
Last week our VP of Developer Relations, Chris Heilmann, flew to Raleigh, North Carolina to present at All Things Open . An excellent event he had spoken at a few times in the past and this being the “Lucky 13” edition, he didn’t hesitate to come and...
With AIs wide open - WeAreDevelopers at All Things Open 2025
DC
Daniel Cranney
Dev Digest 194: AI vs. Version Control, Password Louvre & Cursed Webdev
Inside last week’s Dev Digest 194 . 🧠 Learn how to become an AI-native software engineer 🤷‍♂️ How can you stand out when anyone can build anything? 👂 Whisper Leak allows listening to encrypted chats 🐝 What’s new the OWASP2025 Top Ten List 🙅‍♀️ Curse...
Dev Digest 194: AI vs. Version Control, Password Louvre & Cursed Webdev
DC
Daniel Cranney
Dev Digest 170: All things MCP, huge login data leaks and web privacy
Inside last week’s Dev Digest 170 . 🙌 MCP - Hype or hope? 🤖 Hidden costs of AI coding 😬 2 billion Discord messages leaked 🕵️ W3C releases web privacy principles ⚠️ Detecting malicious unicode 🎂 The history of JavaScript and Java at 30 ▦ A Tailwind g...
Dev Digest 170: All things MCP, huge login data leaks and web privacy

From learning to earning

Jobs that call for the skills explored in this talk.