Halil Özkan
Keymate – Modern Authorization for Developers
#1about 2 minutes
The challenges of traditional in-code authorization logic
Hardcoded authorization checks quickly become unscalable and untestable, leading to a problem known as role explosion.
#2about 1 minute
Introducing Keymate for zero-rewrite authorization on Keycloak
Keymate extends Keycloak to provide fine-grained authorization without requiring application rewrites or data migration from existing identity providers.
#3about 1 minute
Externalizing authorization with service mesh and API gateways
Moving authorization logic out of the application code and into the infrastructure layer like a service mesh allows developers to focus on business logic.
#4about 1 minute
Using SDKs for optional fine-grained in-code control
For cases requiring more control, Keymate provides SDKs for Java, .NET, and JavaScript that support both REST and gRPC protocols.
#5about 1 minute
Leveraging an event-driven architecture for observability
Keymate is built on an event-driven model and uses OpenTelemetry to provide observability and enable parallel runs with existing systems for smooth migration.
Related jobs
Jobs that call for the skills explored in this talk.
Matching moments
02:21 MIN
An overview of Keycloak for identity management
Keycloak case study: Making users happy with service level indicators and observability
23:10 MIN
A modern approach using a decoupled authorization service
Un-complicate authorization maintenance
28:28 MIN
Implementing decoupled authorization with the sidecar pattern
Un-complicate authorization maintenance
39:50 MIN
Using the open source project Cerbos for authorization
Un-complicate authorization maintenance
05:34 MIN
Implementing authentication with Keycloak, Quarkus, and JWT
Get started with securing your cloud-native Java microservices applications
02:49 MIN
Introducing the key players in an OIDC ecosystem
Delegating the chores of authenticating users to Keycloak
01:51 MIN
The challenges of embedding authorization in application code
Decoupled Authorization using Policy as Code
04:57 MIN
Introducing Policy as Code and Open Policy Agent
Decoupled Authorization using Policy as Code
Featured Partners
Related Videos
Un-complicate authorization maintenance
Alex Olivier
Delegating the chores of authenticating users to Keycloak
Alexander Schwartz
Keycloak case study: Making users happy with service level indicators and observability
Alexander Schwartz
Decoupled Authorization using Policy as Code
Anderson Dadario & Denys Vitali
Application Modernization Leveraging Gen-AI for Automated Code Transformation
Syed M Shaaf
Kalo: From Code Chaos to One-Click Polyglot Codegen
Brennan Nunamaker
Delay the AI Overlords: How OAuth and OpenFGA Can Keep Your AI Agents from Going Rogue
Deepu
Get started with securing your cloud-native Java microservices applications
Thomas Südbröcker
Related Articles
View all articles


.gif?w=240&auto=compress,format)
From learning to earning
Jobs that call for the skills explored in this talk.


Backend JAVA Developer - Identity & Access Management (IAM)
Sterrk
Groningen, Netherlands
Remote
€4-7K
Intermediate
DevOps
Docker
Kubernetes
+2



Senior Software Engineer
Keyfactor, Inc.
Senior
Linux
TypeScript
Software Architecture
Continuous Integration


Senior (Lead) Softwareentwickler IAM/Keycloak (all genders)
init AG
Hamburg, Germany
Senior
Continuous Integration

Senior (Lead) Softwareentwickler IAM/Keycloak (all genders)
init AG
Mainz, Germany
Senior
Continuous Integration

Senior (Lead) Softwareentwickler IAM/Keycloak (all genders)
init AG
Berlin, Germany
Senior
Continuous Integration