TLDRecap ⏮️

Welcome to TLDRecap Tech! 👋 TLDRecap Tech summarizes the best tech talks and podcasts from around the world. Get ready to learn something new and exciting!

Model Context Protocol(MCP) Authorization for Enterprise Use Case With Keycloak - Yutaka Obuchi

Presenters Yutaka Obuchi Source KeycloakCon Europe 2026 Unlocking Enterprise AI: How Keycloak and ID Jot Streamline Authorization 🚀 In today’s increasingly complex digital landscape, enterprises are leveraging AI agents to automate tasks and interact with a multitude of tools. But how do we ensure these agents have secure and efficient access to the resources they need, especially within the strict confines of an enterprise environment? Yutaka Obuchi, a dedicated Keycloak contributor and software engineer at Hitachi, dives deep into this critical question, exploring the challenges and presenting an elegant solution using Keycloak and the emerging ID Jot standard. ...

April 13, 2026 · 7 min

The Keycloak-Token-Configuration Mistake, 90% of All Developers Do (and How To Avoid... Niko Köbler

Presenters Niko Köbler Source KeycloakCon Europe 2026 🛡️ Stop Building “God Tokens”: Avoiding the Top Keycloak Mistakes At the first-ever KeycloakCon in Amsterdam, industry veteran Niko Köbler dropped a bombshell: 90% of Keycloak developers are making critical mistakes in their configuration. Having worked with Keycloak since its infancy in 2015, Niko has seen it all—from massive enterprise LDAP migrations to modern microservices architectures. If your application “just works,” you might think you’re safe. But in the world of identity and access management, “working” and “secure” are two very different things. Here is how to stop issuing dangerous God tokens and start implementing professional-grade security. ...

April 13, 2026 · 5 min

Lightning Talk: Airgap-native Identity Management: Lesso... Sebastian Łaskawiec & Michał Szynkiewicz

Presenters Sebastian Łaskawiec Michał Szynkiewicz Source KeycloakCon Europe 2026 Navigating the Unseen: Deploying Keycloak in Air-Gapped Environments 🚀 In the high-stakes world of national security and critical infrastructure, systems need to be as invisible as a submarine in the deep or as impenetrable as a nuclear power plant. This is the realm of air-gapped environments – systems physically disconnected from external networks, prioritizing security above all else. But how do you deploy and manage complex software, like the identity and access management solution Keycloak, in these isolated spaces? ...

April 13, 2026 · 6 min

Advancing Machine to Machine Workflows with the SPIFFE Identity Provider - Andrew Block & Maia Iyer

Presenters Andrew Block Maia Iyer Source KeycloakCon Europe 2026 Advancing Machine-to-Machine Workflows with Spiffy Identity Provider 🚀 In today’s rapidly evolving tech landscape, securing machine-to-machine (M2M) communication is paramount. As applications become more distributed and intelligent, traditional security models struggle to keep pace. This is where the Spiffy Identity Provider steps in, offering a robust solution for establishing workload identities and enabling zero-trust architectures. Join Andrew Block, a Distinguished Architect at Red Hat and Keycloak user, and Maia Iyer from IBM Research, as they dive deep into how Spiffy, in conjunction with Keycloak, revolutionizes M2M security. ...

April 13, 2026 · 5 min

KeycloakCon | Sponsored Keynote: Modernizing Railway IT Architecture: Secure-by-D... Bernhard Denner

Presenters Bernhard Denner Source KeycloakCon Europe 2026 Securing the Rails: Hitachi Rail’s Journey to Next-Gen Cybersecurity with Keycloak 🚂🔒 Ever wondered how the intricate systems that power our global railways stay secure in an increasingly complex digital landscape? Bernhard Denner from Hitachi Rail recently pulled back the curtain, sharing a fascinating look into how they leverage Keycloak to meet stringent cybersecurity demands for their safety-critical and mission-critical solutions. Get ready for an inside track on securing the future of rail! ...

April 13, 2026 · 4 min