Model Context Protocol(MCP) Authorization for Enterprise Use Case With Keycloak - Yutaka Obuchi

Presenters Yutaka Obuchi Source KeycloakCon Europe 2026 Unlocking Enterprise AI: How Keycloak and ID Jot Streamline Authorization 🚀 In today’s increasingly complex digital landscape, enterprises are leveraging AI agents to automate tasks and interact with a multitude of tools. But how do we ensure these agents have secure and efficient access to the resources they need, especially within the strict confines of an enterprise environment? Yutaka Obuchi, a dedicated Keycloak contributor and software engineer at Hitachi, dives deep into this critical question, exploring the challenges and presenting an elegant solution using Keycloak and the emerging ID Jot standard. ...

April 13, 2026 · 7 min

Lightning Talk: Airgap-native Identity Management: Lesso... Sebastian Łaskawiec & Michał Szynkiewicz

Presenters Sebastian Łaskawiec Michał Szynkiewicz Source KeycloakCon Europe 2026 Navigating the Unseen: Deploying Keycloak in Air-Gapped Environments 🚀 In the high-stakes world of national security and critical infrastructure, systems need to be as invisible as a submarine in the deep or as impenetrable as a nuclear power plant. This is the realm of air-gapped environments – systems physically disconnected from external networks, prioritizing security above all else. But how do you deploy and manage complex software, like the identity and access management solution Keycloak, in these isolated spaces? ...

April 13, 2026 · 6 min

Advancing Machine to Machine Workflows with the SPIFFE Identity Provider - Andrew Block & Maia Iyer

Presenters Andrew Block Maia Iyer Source KeycloakCon Europe 2026 Advancing Machine-to-Machine Workflows with SPIFFE Identity Provider 🚀 In today’s rapidly evolving tech landscape, securing machine-to-machine (M2M) communication is paramount. As applications become more distributed and intelligent, traditional security models struggle to keep pace. This is where the SPIFFE Identity Provider steps in, offering a robust solution for establishing workload identities and enabling zero-trust architectures. Join Andrew Block, a Distinguished Architect at Red Hat and Keycloak user, and Maia Iyer from IBM Research, as they dive deep into how SPIFFE, in conjunction with Keycloak, revolutionizes M2M security. ...

April 13, 2026 · 5 min

KeycloakCon | Sponsored Keynote: Modernizing Railway IT Architecture: Secure-by-D... Bernhard Denner

Presenters Bernhard Denner Source KeycloakCon Europe 2026 Securing the Rails: Hitachi Rail’s Journey to Next-Gen Cybersecurity with Keycloak 🚂🔒 Ever wondered how the intricate systems that power our global railways stay secure in an increasingly complex digital landscape? Bernhard Denner from Hitachi Rail recently pulled back the curtain, sharing a fascinating look into how they leverage Keycloak to meet stringent cybersecurity demands for their safety-critical and mission-critical solutions. Get ready for an inside track on securing the future of rail! ...

April 13, 2026 · 4 min

Bridging the Gap Between Human and Workload Identity: SPIF... Arndt Schwenkschuster & Dmitry Telegin

Presenters Arndt Schwenkschuster Dmitry Telegin Source KeycloakCon Europe 2026 🚀 Bridging the Gap: How SPIFFE and Transaction Tokens Secure the Modern Cloud In the fast-evolving world of cloud-native architecture, we face a persistent, nagging problem: how do we connect human identity (the user clicking a button) with workload identity (the microservices talking to each other)? At a recent industry talk, Arndt Schwenkschuster (SPIFFE Maintainer and Standards Architect) and Dmitry Telegin (Keycloak contributor) unveiled a powerful solution. They demonstrated how to use SPIFFE and the emerging OAuth Transaction Tokens specification to create a secure, cryptographically verifiable chain of identity from the frontend all the way to the database. ...

April 13, 2026 · 5 min