Welcome to TLDRecap Tech! 👋 TLDRecap Tech summarizes the best tech talks and podcasts from around the world. Get ready to learn something new and exciting!
Model Context Protocol(MCP) Authorization for Enterprise Use Case With Keycloak - Yutaka Obuchi
Presenters Yutaka Obuchi Source KeycloakCon Europe 2026 Unlocking Enterprise AI: How Keycloak and ID Jot Streamline Authorization 🚀 In today’s increasingly complex digital landscape, enterprises are leveraging AI agents to automate tasks and interact with a multitude of tools. But how do we ensure these agents have secure and efficient access to the resources they need, especially within the strict confines of an enterprise environment? Yutaka Obuchi, a dedicated Keycloak contributor and software engineer at Hitachi, dives deep into this critical question, exploring the challenges and presenting an elegant solution using Keycloak and the emerging ID Jot standard. ...
The Keycloak-Token-Configuration Mistake, 90% of All Developers Do (and How To Avoid... Niko Köbler
Presenters Niko Köbler Source KeycloakCon Europe 2026 🛡️ Stop Building “God Tokens”: Avoiding the Top Keycloak Mistakes At the first-ever KeycloakCon in Amsterdam, industry veteran Niko Köbler dropped a bombshell: 90% of Keycloak developers are making critical mistakes in their configuration. Having worked with Keycloak since its infancy in 2015, Niko has seen it all—from massive enterprise LDAP migrations to modern microservices architectures. If your application “just works,” you might think you’re safe. But in the world of identity and access management, “working” and “secure” are two very different things. Here is how to stop issuing dangerous God tokens and start implementing professional-grade security. ...
Lightning Talk: Airgap-native Identity Management: Lesso... Sebastian Łaskawiec & Michał Szynkiewicz
Presenters Sebastian Łaskawiec Michał Szynkiewicz Source KeycloakCon Europe 2026 Navigating the Unseen: Deploying Keycloak in Air-Gapped Environments 🚀 In the high-stakes world of national security and critical infrastructure, systems need to be as invisible as a submarine in the deep or as impenetrable as a nuclear power plant. This is the realm of air-gapped environments – systems physically disconnected from external networks, prioritizing security above all else. But how do you deploy and manage complex software, like the identity and access management solution Keycloak, in these isolated spaces? ...
Advancing Machine to Machine Workflows with the SPIFFE Identity Provider - Andrew Block & Maia Iyer
Presenters Andrew Block Maia Iyer Source KeycloakCon Europe 2026 Advancing Machine-to-Machine Workflows with Spiffy Identity Provider 🚀 In today’s rapidly evolving tech landscape, securing machine-to-machine (M2M) communication is paramount. As applications become more distributed and intelligent, traditional security models struggle to keep pace. This is where the Spiffy Identity Provider steps in, offering a robust solution for establishing workload identities and enabling zero-trust architectures. Join Andrew Block, a Distinguished Architect at Red Hat and Keycloak user, and Maia Iyer from IBM Research, as they dive deep into how Spiffy, in conjunction with Keycloak, revolutionizes M2M security. ...
KeycloakCon | Sponsored Keynote: Modernizing Railway IT Architecture: Secure-by-D... Bernhard Denner
Presenters Bernhard Denner Source KeycloakCon Europe 2026 Securing the Rails: Hitachi Rail’s Journey to Next-Gen Cybersecurity with Keycloak 🚂🔒 Ever wondered how the intricate systems that power our global railways stay secure in an increasingly complex digital landscape? Bernhard Denner from Hitachi Rail recently pulled back the curtain, sharing a fascinating look into how they leverage Keycloak to meet stringent cybersecurity demands for their safety-critical and mission-critical solutions. Get ready for an inside track on securing the future of rail! ...