Halil Özkan
Keymate – Modern Authorization for Developers
#1about 2 minutes
The challenges of traditional in-code authorization logic
Hardcoded authorization checks quickly become unscalable and untestable, leading to a problem known as role explosion.
#2about 1 minute
Introducing Keymate for zero-rewrite authorization on Keycloak
Keymate extends Keycloak to provide fine-grained authorization without requiring application rewrites or data migration from existing identity providers.
#3about 1 minute
Externalizing authorization with service mesh and API gateways
Moving authorization logic out of the application code and into the infrastructure layer like a service mesh allows developers to focus on business logic.
#4about 1 minute
Using SDKs for optional fine-grained in-code control
For cases requiring more control, Keymate provides SDKs for Java, .NET, and JavaScript that support both REST and gRPC protocols.
#5about 1 minute
Leveraging an event-driven architecture for observability
Keymate is built on an event-driven model and uses OpenTelemetry to provide observability and enable parallel runs with existing systems for smooth migration.
Related jobs
Jobs that call for the skills explored in this talk.
MARKT-PILOT GmbH
Stuttgart, Germany
Remote
€75-90K
Senior
Java
TypeScript
+1
Matching moments
01:15 MIN
Crypto crime, EU regulation, and working while you sleep
Fake or News: Self-Driving Cars on Subscription, Crypto Attacks Rising and Working While You Sleep - Théodore Lefèvre
02:48 MIN
Building trust through honest developer advocacy
Devs vs. Marketers, COBOL and Copilot, Make Live Coding Easy and more - The Best of LIVE 2025 - Part 3
03:16 MIN
Improving the developer feedback loop with specialized tools
Developer Time Is Valuable - Use the Right Tools - Kilian Valkhof
03:17 MIN
Selecting strategic partners and essential event tools
Cat Herding with Lions and Tigers - Christian Heilmann
05:17 MIN
Shifting from traditional CVs to skill-based talent management
From Data Keeper to Culture Shaper: The Evolution of HR Across Growth Stages
03:58 MIN
Making accessibility tooling actionable and encouraging
Developer Time Is Valuable - Use the Right Tools - Kilian Valkhof
03:45 MIN
Preventing exposed API keys in AI-assisted development
Slopquatting, API Keys, Fun with Fonts, Recruiters vs AI and more - The Best of LIVE 2025 - Part 2
01:06 MIN
Malware campaigns, cloud latency, and government IT theft
Fake or News: Self-Driving Cars on Subscription, Crypto Attacks Rising and Working While You Sleep - Théodore Lefèvre
Featured Partners
Related Videos
Un-complicate authorization maintenance
Alex Olivier
Delegating the chores of authenticating users to Keycloak
Alexander Schwartz
Keycloak case study: Making users happy with service level indicators and observability
Alexander Schwartz
Decoupled Authorization using Policy as Code
Anderson Dadario & Denys Vitali
Application Modernization Leveraging Gen-AI for Automated Code Transformation
Syed M Shaaf
Delay the AI Overlords: How OAuth and OpenFGA Can Keep Your AI Agents from Going Rogue
Deepu
Kalo: From Code Chaos to One-Click Polyglot Codegen
Brennan Nunamaker
Get started with securing your cloud-native Java microservices applications
Thomas Südbröcker
Related Articles
View all articles



From learning to earning
Jobs that call for the skills explored in this talk.


Confideck GmbH
Vienna, Austria
Remote
Intermediate
Senior
Node.js
MongoDB
TypeScript


Westhouse Consulting GmbH
Frankfurt am Main, Germany
REST
Docker
Ansible
Grafana
Openshift
+4

init AG
Köln, Germany
Senior
Java
Spring
Continuous Integration

init AG
Mainz, Germany
Senior
Java
Spring
Continuous Integration

init AG
Berlin, Germany
Senior
Java
Spring
Continuous Integration

init AG
München, Germany
Senior
Java
Spring
Continuous Integration

init AG
Hamburg, Germany
Senior
Java
Spring
Continuous Integration