KeyConf25

28 Aug 2025Amsterdam, Netherlands 9am - 6pm
Our annual conference dedicated to the Keycloak user community returns, with even more content and networking opportunities than last year. It’s the perfect place to interact, learn, share, and exchange insights and real-world use cases network with fellow experts, users, and contributors.
150+
Attendees
2
Rooms
1
Panel
13
Talks

About KeyConf

The event is organised with support from the "Keycloak - OAuth2 Special Interest Group," which contributed to building OpenID FAPI standards into Keycloak. There is more standards-related work in progress, and it is a great opportunity to interact with the contributors and be part of such amazing contributions.

Why Join Us

  • Keynote speakers and networking opportunities.
  • In-person for a chance to learn from industry experts.
  • Connect with like-minded professionals.
  • Networking lunch.
  • Business drinks (Get in touch if you would like to sponsor).
Event Starts In:

Speakers & MC

We are delighted to be able to present you with a high-quality speaker line-up consisting of leading Keycloak developers, maintainers & experts. As the Masters of Ceremony, Alexander Schwartz and Dmitry Telegin will lead through the day.
Takashi Norimatsu
Takashi Norimatsu
Senior OSS Specialist
Hitachi, Ltd.
Read more →
Dmitry Telegin
Dmitry Telegin
Principal Backend Engineer
Backbase UK
Read more →
Marcel Meyer
Marcel Meyer
Technology Lead and Senior Solution Architect
adorsys
Read more →
Alexander Schwartz
Alexander Schwartz
Principal Software Engineer
Red Hat
Read more →
Sebastian Schuster
Sebastian Schuster
SRE Team Lead
Bosch Digital
Thomas Darimont
Thomas Darimont
Digital Identity Consultant and Managing Director
Identity Tailor
Read more →
Martin Bartoš
Martin Bartoš
Senior Software Engineer
Red Hat
Read more →
Joseph Garrone
Joseph Garrone
Lead Developer
Insee
Read more →
Maik Kingma
Maik Kingma
Senior Software Craftsman
the/experts
Read more →
Max Maaß
Max Maaß
Senior Software Craftsman
iteratec
Read more →
Tim Walter
Tim Walter
IT Security Architect
iteratec
Read more →
Konstantinos Georgilakis
Konstantinos Georgilakis
GRNET (Greek Research & Technology Network)
Read more →
Pritish Joshi
Pritish Joshi
Technical Architect
Banfico
Read more →

Schedule

9:00 - 9:50

Registration & Welcome Coffee

9:50 - 10:00

Opening remarks and welcome from organisers

10:00 - 10:15

Keycloak OAuth Special Interest Group community message

10:15 - 10:45

Human and Workload Identities: Bridging the Gap with Keycloak

Conference Room 1
Keycloak has gained a wide recognition as a mature IAM solution; but when we say that, we assume human identities in the first place.

Workload identities are another world. They are fundamentally different from human identities in many aspects, such as issuance, lifecycle, presentation and verification. Is Keycloak ready to make its first steps in this completely new area? Thanks to Keycloak's extensible architecture, the answer is a definite "yes".

In this talk, I will focus on the two technologies and their support in Keycloak: SPIFFE, an industry standard for workload identities; Transaction Tokens, an upcoming standard by IETF OAuth WG, which bridges the gap between the two worlds."

10:45 - 11:15

AI Meets Identity: Managing Keycloak with Natural Language via MCP

Conference Room 1
Imagine talking to your IAM system—and it actually understands you. In this talk, I’ll introduce the Keycloak MCP Server & Client, a modular control plane that allows you to manage realms, users, groups, clients, roles, and security policies in Keycloak using a semantic interface—including natural language input.We’ll walk through how the system works with a custom MCP Client as well as Claude (Anthropic) as an AI client, subscribing to Keycloak’s event system, querying security rules, and performing complex tasks like: “Create user XXXX—if this doesn’t violate our security policies.”

The session includes:

  • a brief intro to the MCP concept,
  • introduction of the Keycloak MCP Server and Client,
  • a live showcase of real-world use cases,
  • and an outlook on how AI-powered identity management opens up smarter, more secure, and more intuitive workflows.

11:15 - 11:30

Coffee Break

11:30 - 12:00

Observability in Keycloak: Where Does It Hurt?

Conference Room 1
Keycloak plays a critical role in securing applications and platforms, making its reliability and performance vital in production environments. To ensure smooth operation and fast incident resolution, you need to understand how Keycloak behaves - before things go wrong. Logs, metrics, and traces form the three pillars of observability, all of which are supported in Keycloak. They are backed by troubleshooting and sizing guides, as well as ready-to-use Grafana dashboards that help operators gain deeper insights. In this talk, we'll give a practical overview of Keycloak's observability features, including recent improvements and integrations. We'll walk through a live demo showing how you can correlate metrics with traces to diagnose latency spikes and uncover the root cause of SLO violations. Whether you're operating Keycloak at scale or just getting started, this session will provide the tools and knowledge to monitor, troubleshoot, and optimize your deployment.

(to be announced soon)

Conference Room 2

12:00 - 12:30

The Event Sorcerer with the Keycloak: The Battle against Dynamic Configuration

Conference Room 1
In the evolving realm of Identity and Access Management (IAM), only the most skilled (event) sorcerers can harness the true power of ""the Keycloak"".

Discover how to extend static configurations with sets of dynamic event driven configuration, making your IAM projects resilient against change and highly adaptable. Learn the secrets of coding, versioning, and replaying configurations, ensuring your Keycloak setup is robust, future-proof and, most of all, dynamic.

Join Maik Kingma for a session that blends technical mastery with the lore of IAM, equipping you with the knowledge to wield dynamic configuration like a true sorcerer. By the end, your Keycloak projects will be fortified, ready to face any IAM challenge ahead."

Protectors of the Realm: Breaking and Fixing Keycloak Configurations

Conference Room 2
As Keycloak practitioners, we often focus on implementing features rather than continuously evaluating our security posture. After being responsible for the security of a Keycloak instance in a large-scale project for nearly three years, we've encountered several configuration vulnerabilities that can easily slip through even experienced teams.

In this talk, we'll go beyond the basics to explore common security pitfalls in Keycloak deployments that we've encountered during our journey. More importantly, we'll introduce our open source tool, kcwarden, which we developed to automate security auditing of Keycloak configurations. This tool not only detects standard security issues but can be customized to identify organization-specific concerns such as problematic role assignments or policy violations, enabling continuous monitoring of your Keycloak environment.

Join us to discover how kcwarden can enhance your existing Keycloak deployment's security posture and learn practical strategies for implementing automated configuration checks into your operational workflows."

12:30 - 14:00

Lunch break

Let's have some delicious food together and network.

14:00 - 14:30

Keycloak meets AI: the possibility of integrating Keycloak with AI

Conference Room 1
In this talk, Takashi investigates the possibility of integrating Keycloak with AI agents.

In the field of AI agents, Model Context Protocol (MCP) becomes a hot topic, which makes it easy for an AI agent/tool to connect internal/external services.

When an AI agent/tool implementing an MCP client accesses a remote external service implementing an MCP server, end user authentication and authorization is sometimes required. According to the MCP specification, OAuth 2.1 needs to be used for that, which implies that there is the possibility of using Keycloak for end user authentication and authorization because Keycloak supported OAuth 2.1.

Firstly, Takashi talks about MCP briefly and describes end user authentication and authorization of MCP in more detail. After that, the speaker shows the possible system configuration that includes Keycloak as a part of the MCP server.

Introducing oidc-spa: A keycloak-js alternative that works with any OIDC provider

Conference Room 2
Integrating Keycloak into modern web applications can be challenging, especially for developers used to the polished SDKs and smooth DX of SaaS platforms like Auth0 or Clerk. oidc-spa is an open-source attempt to close that gap, offering a streamlined developer experience inspired by those platforms, while preserving the flexibility of open standards. Beyond improving DX, `oidc-spa` promotes portability: apps built with it aren’t tied to Keycloak. They can run against Microsoft Entra ID, Auth0, or any other OIDC provider that supports the Authorization Code Flow with PKCE, which includes nearly all of them. This is critical in environments where identity infrastructure varies across deployments.

14:30 - 15:00

(to be announced soon)

Conference Room 1

(to be announced soon)

Conference Room 2

15:00 - 15:15

Coffee Break

15:15 - 15:45

Keycloak & OpenID Federation: Empowering Dynamic Trust in Federated Environments

Conference Room 1
This session will explore our journey to integrate OpenID Federation support into Keycloak to enable participation in an identity federation of entities using OpenID Connect and OAuth 2.0. OpenID Federation offers a robust framework for establishing dynamic trust between OpenID Providers (OPs) and Relying Parties (RPs), significantly simplifying the management of large-scale identity federations. By leveraging this specification, Keycloak will enable the dynamic establishment of trust between OPs and RPs, facilitate secure interactions authenticated via Trust Anchors, and crucially, eliminate the need for cumbersome manual or bilateral trust agreements. We'll demonstrate our progress in implementing OpenID Federation support for Keycloak and outline our ongoing plan to integrate this essential functionality into Keycloak's core through collaborative efforts and pull requests with the Keycloak team and the Keycloak OAuth SIG group.

As a foundational step, we aim to enable Keycloak to seamlessly support both explicit and automatic client registration under OpenID Federation, acting as both an OP and an RP within the identity federation using OpenID Connect and OAuth 2.0. We'll show how to enable and configure OpenID Federation on a per-realm basis through the admin console using mandatory and optional realm settings. Our presentation will delve into the REST API and code implementation, with a particular focus on the explicit registration process. We'll also engage in a discussion about outstanding issues, open technical challenges, and future considerations, including the implementation of other OpenID Federation components.

A key use case for this development is the EOSC Beyond project, where Keycloak-powered identity and access management services will participate in the European Open Science Cloud identity federation, leveraging the OpenID Federation specification. This will greatly simplify integration and enhance scalability across the EOSC ecosystem by enabling secure, interoperable access to resources. To bring it all to life, we'll offer a practical demonstration showcasing OpenID Federation in the project context.

(to be announced soon)

Conference Room 2

15:45 - 16:30

Panel discussion: Meet the maintainers

Conference Room 1
The maintainers on the panel will answer the live questions from the audience.

(to be announced soon)

Conference Room 2

16:30 - 16:45

Closing Remarks

17:00 - 18:00

Get Together

Snacks and drinks to network at the hotel.

What's included?

  • Talks from industry-leading speakers
  • FREE drinks, refreshments and lunch
  • Live stream and recorded talks

Venue

Location

Van der Valk Hotel Amsterdam Zuidas – RAI
Tommaso Albinonistraat 200
Zuideramstel
1083 HM Amsterdam
Netherlands

Directions

Please use Google Maps to find out how to get there.

Google Maps

A big 'Thank You' to our Organizers & Sponsors: