<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/">
  <channel>
    <title>Enterprise Management on TLDRecap ⏮️</title>
    <link>https://development.tldrecap.tech/tags/enterprise-management/</link>
    <description>Recent content in Enterprise Management on TLDRecap ⏮️</description>
    <image>
      <title>TLDRecap ⏮️</title>
      <url>https://development.tldrecap.tech/images/tldrecap_logo.jpg</url>
      <link>https://development.tldrecap.tech/images/tldrecap_logo.jpg</link>
    </image>
    <generator>Hugo</generator>
    <language>en</language>
    <lastBuildDate>Mon, 13 Apr 2026 16:37:31 -0700</lastBuildDate>
    <atom:link href="https://development.tldrecap.tech/tags/enterprise-management/index.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>Model Context Protocol(MCP) Authorization for Enterprise Use Case With Keycloak - Yutaka Obuchi</title>
      <link>https://development.tldrecap.tech/posts/2026/keycloakcon-europe/keycloak-id-jot-enterprise-authorization/</link>
      <pubDate>Mon, 13 Apr 2026 16:37:31 -0700</pubDate>
      <guid>https://development.tldrecap.tech/posts/2026/keycloakcon-europe/keycloak-id-jot-enterprise-authorization/</guid>
      <description>&lt;p&gt;&lt;strong&gt;Presenters&lt;/strong&gt;&lt;/p&gt;
&lt;div&gt;
  &lt;ul&gt;
    &lt;li&gt;
      &lt;a href=&#34;https://development.tldrecap.tech/presenters/yutaka-obuchi&#34;&gt;Yutaka Obuchi&lt;/a&gt;
    &lt;/li&gt;&lt;/ul&gt;
&lt;/div&gt;
&lt;p&gt;&lt;strong&gt;Source&lt;/strong&gt;&lt;/p&gt;
&lt;div&gt;
  &lt;ul&gt;
    &lt;li&gt;
      &lt;a href=&#34;https://development.tldrecap.tech/sources/keycloakcon-europe-2026&#34;&gt;KeycloakCon Europe 2026&lt;/a&gt;
    &lt;/li&gt;&lt;/ul&gt;
&lt;/div&gt;
&lt;h1 id=&#34;unlocking-enterprise-ai-how-keycloak-and-id-jot-streamline-authorization-&#34;&gt;Unlocking Enterprise AI: How Keycloak and ID Jot Streamline Authorization 🚀&lt;/h1&gt;
&lt;p&gt;In today&amp;rsquo;s increasingly complex digital landscape, enterprises are leveraging AI
agents to automate tasks and interact with a multitude of tools. But how do we
ensure these agents have secure and efficient access to the resources they need,
especially within the strict confines of an enterprise environment? Yutaka
Obuchi, a dedicated Keycloak contributor and software engineer at Hitachi, dives
deep into this critical question, exploring the challenges and presenting an
elegant solution using Keycloak and the emerging ID Jot standard.&lt;/p&gt;</description>
    </item>
  </channel>
</rss>
