Upgrade to Pro — share decks privately, control downloads, hide ads and more …

Digital identities for your sovereign cloud wit...

Digital identities for your sovereign cloud with Keycloak

Digital identities are essential for digital sovereignty, as they allow access to applications and data. Whoever manages these identities controls application access and data flow. A self-managed identity access management (IAM) tool like Keycloak provides full control over employee and customer digital identities. It can be integrated with your applications using OpenID Connect and SAML, and authenticate your users securely with second factors or passkeys. Keycloak can be hosted on premise or in the cloud—and move as your business needs change. Choose the features you want, customize them where needed, build on existing infrastructures like Lightweight Directory Access Protocol (LDAP) and Kerberos, and integrate it with other identity providers via federation across organizations. I’ll show how to implement and self-host digital identities, with case studies for e-government, banking, and startups. We’ll also review the latest features and roadmap of the project.

Avatar for Alexander Schwartz

Alexander Schwartz

May 02, 2026

More Decks by Alexander Schwartz

Other Decks in Technology

Transcript

  1. Digital identities for sovereign cloud with Keycloak Alexander Schwartz |

    Principal Software Engineer | IBM Red Hat Summit | Atlanta (US) | 2026-05-11
  2. Full Control over: • Confidentiality • Integrity • Availability •

    APIs and functionality • Rules • Audit logs Self-Hosting Identity and Access Management Full responsibility for: • Confidentiality • Integrity • Availability • APIs and functionality • Rules • Audit logs
  3. Keycloak is an Open Source Identity und Access Management System

    🎂 First Commit 2013-07-02 🏆 Cloud Native Computing Foundation Incubating project since April 2023 📜 Apache License, Version 2.0 ⭐ 34k GitHub stars
  4. Day 1: Single-Sign-On is cool! • Users need to remember

    only one password • Authenticate only once per day • Add second factor for authentication for security • Theme the frontend to match your needs Makes sense already for a single application!
  5. Day 2: Become flexible in your setup • Integrate LDAP

    and Kerberos • Brokerage to existing SAML services • Brokerage to existing OIDC services • Integrate existing custom stores • SCIM integration (experimental) Reuse the existing user infrastructure!
  6. Connecting LDAP LDAP • Read-Only? • Import users? • Caching?

    • Use for authentication? • Synchronize? • Kerberos?
  7. Connecting to other Identity Providers SAML OpenID Connect OAuth 2.0

    SAML OpenID Connect OAuth 2.0 • Which claims und attributes? • Allow local credentials?
  8. Day 3: Eliminate daily churn • User required actions •

    User password recovery (even when using LDAP) • Self-registration for users • User data self-management Resolve the need for calls and tickets!
  9. Case Studies Hitachi Ltd. used Keycloak to make financial grade

    security easier OpenTalk achieves versatile and compliant user authentication with Keycloak BRZ migrated the Austrian Business Service Portal with 2M+ users to Keycloak https://www.keycloak.org/case-studies
  10. New: Better security for humans and machines 🦎 Standard Token

    Exchange Exact and secure tokens with the right audience/scopes. 🚪 JWT Authorization Grant Authenticate locally, then use trust relationships. 🔑 2FA recovery codes, Passkeys, FAPI 2.0, DPoP, MCP Tightened security in all login flows. ⚙ Workflows Automate all stages of the user lifecycle management.
  11. New: Automation and better tools for admins ⛱ Fine Grained

    Admin Permissions Delegate administration access to resource owners. ♻ Secure comms, split-brain detection, rolling updates Making an administrator’s life simpler. 🔗 Federated Client Authentication Managing credentials of clients across the infrastructure. 📈 Observability Guide, Dashboards, OpenTelemetry Happy users with great monitoring and analysis tools.
  12. Outlook* 🤖 More AI features and standards CIMD, MCP, …

    🗂 SCIM Integrating with other IdPs and pre-provision users 🔒 Post-Quantum Cryptography Support it for TLS connections, tokens and credentials 🔌 Client v2 API and Custom Resources for Clients Declarative provisioning of clients * subject to change
  13. 2025 and 2026 added a lot of 󰭈 security enhancements,

    let’ use them! Subscribe 🔔 to each each issue and try out our nightly releases! 🔎
  14. • Keycloak https://www.keycloak.org/ • Case Studies https://www.keycloak.org/case-studies • KeycloakCon +

    KubeCon Japan (July 2026) https://events.linuxfoundation.org/kubecon-cloudnativecon-japan/ • KeyConf Prague (October 2027) https://keyconf.dev/ Links Sides: