Alexander Schwartz
Delegating the chores of authenticating users to Keycloak
#1about 3 minutes
Understanding the complexities of modern user authentication
Delegating authentication is necessary because it involves more than just a login form, including registration, password recovery, and multi-factor authentication.
#2about 2 minutes
Introducing the key players in an OIDC ecosystem
The OpenID Connect architecture consists of three main actors: the end-user, the OpenID Provider like Keycloak, and the client application or relying party.
#3about 6 minutes
Using OIDC prompts for different user actions
Applications can use specific OIDC prompt parameters to check login status, initiate user registration, or trigger a standard login.
#4about 3 minutes
Handling session state, tokens, and user information
OpenID Connect provides standard endpoints and flows for checking session status with iframes, refreshing expired tokens, fetching user data, and securely logging out.
#5about 1 minute
Implementing step-up authentication for sensitive actions
Use Authentication Context Class Reference (ACR) values to request a higher level of assurance, such as a second factor, for critical operations.
#6about 3 minutes
Leveraging Keycloak's application-initiated actions
Keycloak's application-initiated actions allow you to redirect users to specific pages for tasks like updating their profile, changing a password, or verifying an email address.
#7about 2 minutes
Configuring user profiles for incremental data collection
Keycloak's user profile feature enables defining custom user attributes and using scopes to implement incremental profiling, collecting data only when an application requires it.
#8about 3 minutes
Customizing login flows and exploring further capabilities
Beyond standard authentication, Keycloak allows for customizing login flows to restrict client access and provides built-in support for features like password resets and remember me.
Related jobs
Jobs that call for the skills explored in this talk.
Matching moments
02:21 MIN
An overview of Keycloak for identity management
Keycloak case study: Making users happy with service level indicators and observability
41:16 MIN
Answering audience questions on authorization best practices
Un-complicate authorization maintenance
12:22 MIN
Implementing the authentication and authorization workflow
Get started with securing your cloud-native Java microservices applications
00:29 MIN
Exploring the user experience flaws in web authentication
SSO with Ethereum and Next JS
45:52 MIN
Local testing and advanced security with OIDC
CI/CD with Github Actions
02:12 MIN
Introducing Keymate for zero-rewrite authorization on Keycloak
Keymate – Modern Authorization for Developers
24:06 MIN
A practical guide to adopting modern authentication methods
Going Beyond Passwords: The Future of User Authentication
33:10 MIN
Q&A on career path and the future of passwordless
Accelerating Authentication Architecture: Taking Passwordless to the Next Level
Featured Partners
Related Videos
Keycloak case study: Making users happy with service level indicators and observability
Alexander Schwartz
Going Beyond Passwords: The Future of User Authentication
Gift Egwuenu
Keymate – Modern Authorization for Developers
Halil Özkan
Break the Chain: Decentralized solutions for today’s Web2.0 privacy problems
Adam Larter
Un-complicate authorization maintenance
Alex Olivier
Accelerating Authentication Architecture: Taking Passwordless to the Next Level
Yedidya Schwartz
Passwordless future: WebAuthn and Passkeys in practice
Clemens Hübner
Passwordless Web 1.5
Paweł Łukaszuk
Related Articles
View all articles



From learning to earning
Jobs that call for the skills explored in this talk.

Keycloak & IAM Solutions Architekt
Westhouse Consulting GmbH
Frankfurt am Main, Germany
REST
Docker
Ansible
Grafana
Openshift
+4

Senior IAM-Berater - Red Hat SSO (Keycloak) in SB
Ebcont Group
Saarbrücken, Germany
Senior
DevOps
Microsoft Office
Agile Methodologies
Red Hat Enterprise Linux - RHEL

Product Owner SAP Authorization + Identity
dmTECH
Karlsruhe, Germany


Senior (Lead) Softwareentwickler IAM/Keycloak (all genders)
init AG
Mainz, Germany
Senior
Java
Spring
Continuous Integration

Senior (Lead) Softwareentwickler IAM/Keycloak (all genders)
init AG
Berlin, Germany
Senior
Java
Spring
Continuous Integration

Senior (Lead) Softwareentwickler IAM/Keycloak (all genders)
init AG
Hamburg, Germany
Senior
Java
Spring
Continuous Integration

Senior (Lead) Softwareentwickler IAM/Keycloak (all genders)
init AG
Leipzig, Germany
Senior
Java
Spring
Continuous Integration

Senior (Lead) Softwareentwickler IAM/Keycloak (all genders)
init AG
München, Germany
Senior
Java
Spring
Continuous Integration