Harness Engineering: How to Build Software When Humans Steer, Agents Execute — Ryan Lopopolo, OpenAI

Presenters Ryan Lopopolo Vibhu Sapra Source AI Engineer Europe 2026 Harness Engineering: Building Software with Humans Steering and Agents Executing 🚀 The world of software development is undergoing a seismic shift, and at the forefront of this revolution is Ryan Lopopolo, a Member of Technical Staff at OpenAI. For the past nine months, Ryan has been living and breathing a new paradigm: building software exclusively with agents. He’s a self-proclaimed “token billionaire,” not in the financial sense, but in his belief that everyone should have access to the power of AI models to accomplish complex tasks. ...

April 16, 2026 · 6 min

Building pi in a World of Slop — Mario Zechner

Presenters Mario Zechner Source AI Engineer Europe 2026 🚀 Beyond the Slop: Why I Built Pi and Why We Need to Slow Down Hey there, I’m Mario Zechner. Recently, I’ve been wearing a t-shirt covered in paid ad space to raise money for charity, but when I’m not being a human billboard, I’m thinking about the “tragedy” of modern AI development. We are currently living in a world of slop, and I’m here to tell you how I built Pi to escape it. ...

April 16, 2026 · 5 min

Model Context Protocol(MCP) Authorization for Enterprise Use Case With Keycloak - Yutaka Obuchi

Presenters Yutaka Obuchi Source KeycloakCon Europe 2026 Unlocking Enterprise AI: How Keycloak and ID Jot Streamline Authorization 🚀 In today’s increasingly complex digital landscape, enterprises are leveraging AI agents to automate tasks and interact with a multitude of tools. But how do we ensure these agents have secure and efficient access to the resources they need, especially within the strict confines of an enterprise environment? Yutaka Obuchi, a dedicated Keycloak contributor and software engineer at Hitachi, dives deep into this critical question, exploring the challenges and presenting an elegant solution using Keycloak and the emerging ID Jot standard. ...

April 13, 2026 · 7 min

The Keycloak-Token-Configuration Mistake, 90% of All Developers Do (and How To Avoid... Niko Köbler

Presenters Niko Köbler Source KeycloakCon Europe 2026 🛡️ Stop Building “God Tokens”: Avoiding the Top Keycloak Mistakes At the first-ever KeycloakCon in Amsterdam, industry veteran Niko Köbler dropped a bombshell: 90% of Keycloak developers are making critical mistakes in their configuration. Having worked with Keycloak since its infancy in 2015, Niko has seen it all—from massive enterprise LDAP migrations to modern microservices architectures. If your application “just works,” you might think you’re safe. But in the world of identity and access management, “working” and “secure” are two very different things. Here is how to stop issuing dangerous God tokens and start implementing professional-grade security. ...

April 13, 2026 · 5 min

Advancing Machine to Machine Workflows with the SPIFFE Identity Provider - Andrew Block & Maia Iyer

Presenters Andrew Block Maia Iyer Source KeycloakCon Europe 2026 Advancing Machine-to-Machine Workflows with SPIFFE Identity Provider 🚀 In today’s rapidly evolving tech landscape, securing machine-to-machine (M2M) communication is paramount. As applications become more distributed and intelligent, traditional security models struggle to keep pace. This is where the SPIFFE Identity Provider steps in, offering a robust solution for establishing workload identities and enabling zero-trust architectures. Join Andrew Block, a Distinguished Architect at Red Hat and Keycloak user, and Maia Iyer from IBM Research, as they dive deep into how SPIFFE, in conjunction with Keycloak, revolutionizes M2M security. ...

April 13, 2026 · 5 min