<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/">
  <channel>
    <title>KeycloakCon Europe 2026 on TLDRecap ⏮️</title>
    <link>https://development.tldrecap.tech/sources/keycloakcon-europe-2026/</link>
    <description>Recent content in KeycloakCon Europe 2026 on TLDRecap ⏮️</description>
    <image>
      <title>TLDRecap ⏮️</title>
      <url>https://development.tldrecap.tech/images/tldrecap_logo.jpg</url>
      <link>https://development.tldrecap.tech/images/tldrecap_logo.jpg</link>
    </image>
    <generator>Hugo</generator>
    <language>en</language>
    <lastBuildDate>Mon, 13 Apr 2026 16:37:31 -0700</lastBuildDate>
    <atom:link href="https://development.tldrecap.tech/sources/keycloakcon-europe-2026/index.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>Model Context Protocol(MCP) Authorization for Enterprise Use Case With Keycloak - Yutaka Obuchi</title>
      <link>https://development.tldrecap.tech/posts/2026/keycloakcon-europe/keycloak-id-jot-enterprise-authorization/</link>
      <pubDate>Mon, 13 Apr 2026 16:37:31 -0700</pubDate>
      <guid>https://development.tldrecap.tech/posts/2026/keycloakcon-europe/keycloak-id-jot-enterprise-authorization/</guid>
      <description>&lt;p&gt;&lt;strong&gt;Presenters&lt;/strong&gt;&lt;/p&gt;
&lt;div&gt;
  &lt;ul&gt;
    &lt;li&gt;
      &lt;a href=&#34;https://development.tldrecap.tech/presenters/yutaka-obuchi&#34;&gt;Yutaka Obuchi&lt;/a&gt;
    &lt;/li&gt;&lt;/ul&gt;
&lt;/div&gt;
&lt;p&gt;&lt;strong&gt;Source&lt;/strong&gt;&lt;/p&gt;
&lt;div&gt;
  &lt;ul&gt;
    &lt;li&gt;
      &lt;a href=&#34;https://development.tldrecap.tech/sources/keycloakcon-europe-2026&#34;&gt;KeycloakCon Europe 2026&lt;/a&gt;
    &lt;/li&gt;&lt;/ul&gt;
&lt;/div&gt;
&lt;h1 id=&#34;unlocking-enterprise-ai-how-keycloak-and-id-jot-streamline-authorization-&#34;&gt;Unlocking Enterprise AI: How Keycloak and ID Jot Streamline Authorization 🚀&lt;/h1&gt;
&lt;p&gt;In today&amp;rsquo;s increasingly complex digital landscape, enterprises are leveraging AI
agents to automate tasks and interact with a multitude of tools. But how do we
ensure these agents have secure and efficient access to the resources they need,
especially within the strict confines of an enterprise environment? Yutaka
Obuchi, a dedicated Keycloak contributor and software engineer at Hitachi, dives
deep into this critical question, exploring the challenges and presenting an
elegant solution using Keycloak and the emerging ID Jot standard.&lt;/p&gt;</description>
    </item>
    <item>
      <title>The Keycloak-Token-Configuration Mistake, 90% of All Developers Do (and How To Avoid... Niko Köbler</title>
      <link>https://development.tldrecap.tech/posts/2026/keycloakcon-europe/keycloak-god-tokens-mistakes/</link>
      <pubDate>Mon, 13 Apr 2026 16:37:31 -0700</pubDate>
      <guid>https://development.tldrecap.tech/posts/2026/keycloakcon-europe/keycloak-god-tokens-mistakes/</guid>
      <description>&lt;p&gt;&lt;strong&gt;Presenters&lt;/strong&gt;&lt;/p&gt;
&lt;div&gt;
  &lt;ul&gt;
    &lt;li&gt;
      &lt;a href=&#34;https://development.tldrecap.tech/presenters/niko-k%C3%B6bler&#34;&gt;Niko Köbler&lt;/a&gt;
    &lt;/li&gt;&lt;/ul&gt;
&lt;/div&gt;
&lt;p&gt;&lt;strong&gt;Source&lt;/strong&gt;&lt;/p&gt;
&lt;div&gt;
  &lt;ul&gt;
    &lt;li&gt;
      &lt;a href=&#34;https://development.tldrecap.tech/sources/keycloakcon-europe-2026&#34;&gt;KeycloakCon Europe 2026&lt;/a&gt;
    &lt;/li&gt;&lt;/ul&gt;
&lt;/div&gt;
&lt;h1 id=&#34;-stop-building-god-tokens-avoiding-the-top-keycloak-mistakes&#34;&gt;🛡️ Stop Building &amp;ldquo;God Tokens&amp;rdquo;: Avoiding the Top Keycloak Mistakes&lt;/h1&gt;
&lt;p&gt;At the first-ever &lt;strong&gt;KeycloakCon&lt;/strong&gt; in Amsterdam, industry veteran &lt;strong&gt;Niko Köbler&lt;/strong&gt;
dropped a bombshell: &lt;strong&gt;90% of Keycloak developers&lt;/strong&gt; are making critical mistakes
in their configuration. Having worked with Keycloak since its infancy in
&lt;strong&gt;2015&lt;/strong&gt;, Niko has seen it all—from massive enterprise LDAP migrations to modern
microservices architectures.&lt;/p&gt;
&lt;p&gt;If your application &amp;ldquo;just works,&amp;rdquo; you might think you&amp;rsquo;re safe. But in the world
of identity and access management, &amp;ldquo;working&amp;rdquo; and &amp;ldquo;secure&amp;rdquo; are two very different
things. Here is how to stop issuing dangerous &lt;strong&gt;God tokens&lt;/strong&gt; and start
implementing professional-grade security.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Lightning Talk: Airgap-native Identity Management: Lesso... Sebastian Łaskawiec &amp; Michał Szynkiewicz</title>
      <link>https://development.tldrecap.tech/posts/2026/keycloakcon-europe/air-gapped-keycloak-zarf-deployment/</link>
      <pubDate>Mon, 13 Apr 2026 16:37:26 -0700</pubDate>
      <guid>https://development.tldrecap.tech/posts/2026/keycloakcon-europe/air-gapped-keycloak-zarf-deployment/</guid>
      <description>&lt;p&gt;&lt;strong&gt;Presenters&lt;/strong&gt;&lt;/p&gt;
&lt;div&gt;
  &lt;ul&gt;
    &lt;li&gt;
      &lt;a href=&#34;https://development.tldrecap.tech/presenters/sebastian-%C5%82askawiec&#34;&gt;Sebastian Łaskawiec&lt;/a&gt;
    &lt;/li&gt;&lt;li&gt;
      &lt;a href=&#34;https://development.tldrecap.tech/presenters/micha%C5%82-szynkiewicz&#34;&gt;Michał Szynkiewicz&lt;/a&gt;
    &lt;/li&gt;&lt;/ul&gt;
&lt;/div&gt;
&lt;p&gt;&lt;strong&gt;Source&lt;/strong&gt;&lt;/p&gt;
&lt;div&gt;
  &lt;ul&gt;
    &lt;li&gt;
      &lt;a href=&#34;https://development.tldrecap.tech/sources/keycloakcon-europe-2026&#34;&gt;KeycloakCon Europe 2026&lt;/a&gt;
    &lt;/li&gt;&lt;/ul&gt;
&lt;/div&gt;
&lt;h1 id=&#34;navigating-the-unseen-deploying-keycloak-in-air-gapped-environments-&#34;&gt;Navigating the Unseen: Deploying Keycloak in Air-Gapped Environments 🚀&lt;/h1&gt;
&lt;p&gt;In the high-stakes world of national security and critical infrastructure,
systems need to be as invisible as a submarine in the deep or as impenetrable as
a nuclear power plant. This is the realm of &lt;strong&gt;air-gapped environments&lt;/strong&gt; –
systems physically disconnected from external networks, prioritizing security
above all else. But how do you deploy and manage complex software, like the
identity and access management solution Keycloak, in these isolated spaces?&lt;/p&gt;</description>
    </item>
    <item>
      <title>Advancing Machine to Machine Workflows with the SPIFFE Identity Provider - Andrew Block &amp; Maia Iyer</title>
      <link>https://development.tldrecap.tech/posts/2026/keycloakcon-europe/spiffy-identity-keycloak-m2m-security/</link>
      <pubDate>Mon, 13 Apr 2026 16:36:47 -0700</pubDate>
      <guid>https://development.tldrecap.tech/posts/2026/keycloakcon-europe/spiffy-identity-keycloak-m2m-security/</guid>
      <description>&lt;p&gt;&lt;strong&gt;Presenters&lt;/strong&gt;&lt;/p&gt;
&lt;div&gt;
  &lt;ul&gt;
    &lt;li&gt;
      &lt;a href=&#34;https://development.tldrecap.tech/presenters/andrew-block&#34;&gt;Andrew Block&lt;/a&gt;
    &lt;/li&gt;&lt;li&gt;
      &lt;a href=&#34;https://development.tldrecap.tech/presenters/maia-iyer&#34;&gt;Maia Iyer&lt;/a&gt;
    &lt;/li&gt;&lt;/ul&gt;
&lt;/div&gt;
&lt;p&gt;&lt;strong&gt;Source&lt;/strong&gt;&lt;/p&gt;
&lt;div&gt;
  &lt;ul&gt;
    &lt;li&gt;
      &lt;a href=&#34;https://development.tldrecap.tech/sources/keycloakcon-europe-2026&#34;&gt;KeycloakCon Europe 2026&lt;/a&gt;
    &lt;/li&gt;&lt;/ul&gt;
&lt;/div&gt;
&lt;h1 id=&#34;advancing-machine-to-machine-workflows-with-spiffy-identity-provider-&#34;&gt;Advancing Machine-to-Machine Workflows with Spiffy Identity Provider 🚀&lt;/h1&gt;
&lt;p&gt;In today&amp;rsquo;s rapidly evolving tech landscape, securing machine-to-machine (M2M)
communication is paramount. As applications become more distributed and
intelligent, traditional security models struggle to keep pace. This is where
the &lt;strong&gt;Spiffy Identity Provider&lt;/strong&gt; steps in, offering a robust solution for
establishing workload identities and enabling zero-trust architectures. Join
Andrew Block, a Distinguished Architect at Red Hat and Keycloak user, and Maia
Iyer from IBM Research, as they dive deep into how Spiffy, in conjunction with
Keycloak, revolutionizes M2M security.&lt;/p&gt;</description>
    </item>
    <item>
      <title>KeycloakCon | Sponsored Keynote: Modernizing Railway IT Architecture: Secure-by-D... Bernhard Denner</title>
      <link>https://development.tldrecap.tech/posts/2026/keycloakcon-europe/hitachi-rail-keycloak-cybersecurity/</link>
      <pubDate>Mon, 13 Apr 2026 16:36:47 -0700</pubDate>
      <guid>https://development.tldrecap.tech/posts/2026/keycloakcon-europe/hitachi-rail-keycloak-cybersecurity/</guid>
      <description>&lt;p&gt;&lt;strong&gt;Presenters&lt;/strong&gt;&lt;/p&gt;
&lt;div&gt;
  &lt;ul&gt;
    &lt;li&gt;
      &lt;a href=&#34;https://development.tldrecap.tech/presenters/bernhard-denner&#34;&gt;Bernhard Denner&lt;/a&gt;
    &lt;/li&gt;&lt;/ul&gt;
&lt;/div&gt;
&lt;p&gt;&lt;strong&gt;Source&lt;/strong&gt;&lt;/p&gt;
&lt;div&gt;
  &lt;ul&gt;
    &lt;li&gt;
      &lt;a href=&#34;https://development.tldrecap.tech/sources/keycloakcon-europe-2026&#34;&gt;KeycloakCon Europe 2026&lt;/a&gt;
    &lt;/li&gt;&lt;/ul&gt;
&lt;/div&gt;
&lt;h1 id=&#34;securing-the-rails-hitachi-rails-journey-to-next-gen-cybersecurity-with-keycloak-&#34;&gt;Securing the Rails: Hitachi Rail&amp;rsquo;s Journey to Next-Gen Cybersecurity with Keycloak 🚂🔒&lt;/h1&gt;
&lt;p&gt;Ever wondered how the intricate systems that power our global railways stay
secure in an increasingly complex digital landscape? Bernhard Denner from
Hitachi Rail recently pulled back the curtain, sharing a fascinating look into
how they leverage Keycloak to meet stringent cybersecurity demands for their
safety-critical and mission-critical solutions. Get ready for an inside track on
securing the future of rail!&lt;/p&gt;</description>
    </item>
    <item>
      <title>Bridging the Gap Between Human and Workload Identity: SPIF... Arndt Schwenkschuster &amp; Dmitry Telegin</title>
      <link>https://development.tldrecap.tech/posts/2026/keycloakcon-europe/cloud-identity-transaction-tokens/</link>
      <pubDate>Mon, 13 Apr 2026 16:36:46 -0700</pubDate>
      <guid>https://development.tldrecap.tech/posts/2026/keycloakcon-europe/cloud-identity-transaction-tokens/</guid>
      <description>&lt;p&gt;&lt;strong&gt;Presenters&lt;/strong&gt;&lt;/p&gt;
&lt;div&gt;
  &lt;ul&gt;
    &lt;li&gt;
      &lt;a href=&#34;https://development.tldrecap.tech/presenters/arndt-schwenkschuster&#34;&gt;Arndt Schwenkschuster&lt;/a&gt;
    &lt;/li&gt;&lt;li&gt;
      &lt;a href=&#34;https://development.tldrecap.tech/presenters/dmitry-telegin&#34;&gt;Dmitry Telegin&lt;/a&gt;
    &lt;/li&gt;&lt;/ul&gt;
&lt;/div&gt;
&lt;p&gt;&lt;strong&gt;Source&lt;/strong&gt;&lt;/p&gt;
&lt;div&gt;
  &lt;ul&gt;
    &lt;li&gt;
      &lt;a href=&#34;https://development.tldrecap.tech/sources/keycloakcon-europe-2026&#34;&gt;KeycloakCon Europe 2026&lt;/a&gt;
    &lt;/li&gt;&lt;/ul&gt;
&lt;/div&gt;
&lt;h1 id=&#34;-bridging-the-gap-how-spiffy-and-transaction-tokens-secure-the-modern-cloud&#34;&gt;🚀 Bridging the Gap: How Spiffy and Transaction Tokens Secure the Modern Cloud&lt;/h1&gt;
&lt;p&gt;In the fast-evolving world of cloud-native architecture, we face a persistent,
nagging problem: how do we connect &lt;strong&gt;human identity&lt;/strong&gt; (the user clicking a
button) with &lt;strong&gt;workload identity&lt;/strong&gt; (the microservices talking to each other)?&lt;/p&gt;
&lt;p&gt;At a recent industry talk, &lt;strong&gt;Arndt Schwenkschuster&lt;/strong&gt; (Spiffy Maintainer and
Standards Architect) and &lt;strong&gt;Dmitry Telegin&lt;/strong&gt; (Keycloak contributor) unveiled a
powerful solution. They demonstrated how to use &lt;strong&gt;Spiffy&lt;/strong&gt; and the emerging
&lt;strong&gt;OAuth Transaction Tokens&lt;/strong&gt; specification to create a secure, cryptographically
verifiable chain of identity from the frontend all the way to the database.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Lightning Talk: Effortlessly Integrating Keycloak Authentication To Your MCP Servers - Lin Sun</title>
      <link>https://development.tldrecap.tech/posts/2026/keycloakcon-europe/keycloak-mcp-gateway/</link>
      <pubDate>Mon, 13 Apr 2026 16:36:44 -0700</pubDate>
      <guid>https://development.tldrecap.tech/posts/2026/keycloakcon-europe/keycloak-mcp-gateway/</guid>
      <description>&lt;p&gt;&lt;strong&gt;Presenters&lt;/strong&gt;&lt;/p&gt;
&lt;div&gt;
  &lt;ul&gt;
    &lt;li&gt;
      &lt;a href=&#34;https://development.tldrecap.tech/presenters/lin-sun&#34;&gt;Lin Sun&lt;/a&gt;
    &lt;/li&gt;&lt;/ul&gt;
&lt;/div&gt;
&lt;p&gt;&lt;strong&gt;Source&lt;/strong&gt;&lt;/p&gt;
&lt;div&gt;
  &lt;ul&gt;
    &lt;li&gt;
      &lt;a href=&#34;https://development.tldrecap.tech/sources/keycloakcon-europe-2026&#34;&gt;KeycloakCon Europe 2026&lt;/a&gt;
    &lt;/li&gt;&lt;/ul&gt;
&lt;/div&gt;
&lt;h1 id=&#34;seamlessly-integrate-keycloak-authentication-with-your-mcp-server-&#34;&gt;Seamlessly Integrate Keycloak Authentication with Your MCP Server 🚀&lt;/h1&gt;
&lt;p&gt;Ever wished you could secure your MCP servers without diving deep into code
modifications and complex redeployments? Well, buckle up, because Lin Song from
Solo.io is here to show us how! In this insightful session from Keycloak Kong,
Lin walks us through integrating Keycloak authentication into an MCP server,
demonstrating a powerful approach using a gateway.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Lightning Talk: Keycloak and EUDI-Wallet: A Match Made in Heaven? - Dominik Schlosser, Freelancer</title>
      <link>https://development.tldrecap.tech/posts/2026/keycloakcon-europe/keycloak-eu-digital-identity/</link>
      <pubDate>Mon, 13 Apr 2026 16:36:43 -0700</pubDate>
      <guid>https://development.tldrecap.tech/posts/2026/keycloakcon-europe/keycloak-eu-digital-identity/</guid>
      <description>&lt;p&gt;&lt;strong&gt;Presenters&lt;/strong&gt;&lt;/p&gt;
&lt;div&gt;
  &lt;ul&gt;
    &lt;li&gt;
      &lt;a href=&#34;https://development.tldrecap.tech/presenters/dominik-schlosser&#34;&gt;Dominik Schlosser&lt;/a&gt;
    &lt;/li&gt;&lt;/ul&gt;
&lt;/div&gt;
&lt;p&gt;&lt;strong&gt;Source&lt;/strong&gt;&lt;/p&gt;
&lt;div&gt;
  &lt;ul&gt;
    &lt;li&gt;
      &lt;a href=&#34;https://development.tldrecap.tech/sources/keycloakcon-europe-2026&#34;&gt;KeycloakCon Europe 2026&lt;/a&gt;
    &lt;/li&gt;&lt;/ul&gt;
&lt;/div&gt;
&lt;h1 id=&#34;unlocking-the-future-of-digital-identity-keycloak-meets-the-eu-digital-identity-wallet-&#34;&gt;Unlocking the Future of Digital Identity: Keycloak Meets the EU Digital Identity Wallet 🚀&lt;/h1&gt;
&lt;p&gt;Hey tech enthusiasts! Get ready to dive into the exciting world of digital
identity, where cutting-edge technology is revolutionizing how we interact with
online services. In this post, we&amp;rsquo;re going to explore the powerful synergy
between &lt;strong&gt;Keycloak&lt;/strong&gt;, a leading identity and access management solution, and the
&lt;strong&gt;EU Digital Identity Wallet&lt;/strong&gt;, a game-changer for secure and user-centric
digital identification.&lt;/p&gt;</description>
    </item>
  </channel>
</rss>
