Delegating the chores of authenticating users to Keycloak
Stop building user authentication. Learn how to delegate the chores of registration, password resets, and session management to Keycloak and focus on your core application.
#1about 3 minutes
Understanding the complexities of modern user authentication
Delegating authentication is necessary because it involves more than just a login form, including registration, password recovery, and multi-factor authentication.
#2about 2 minutes
Introducing the key players in an OIDC ecosystem
The OpenID Connect architecture consists of three main actors: the end-user, the OpenID Provider like Keycloak, and the client application or relying party.
#3about 6 minutes
Using OIDC prompts for different user actions
Applications can use specific OIDC prompt parameters to check login status, initiate user registration, or trigger a standard login.
#4about 3 minutes
Handling session state, tokens, and user information
OpenID Connect provides standard endpoints and flows for checking session status with iframes, refreshing expired tokens, fetching user data, and securely logging out.
#5about 1 minute
Implementing step-up authentication for sensitive actions
Use Authentication Context Class Reference (ACR) values to request a higher level of assurance, such as a second factor, for critical operations.
Keycloak's application-initiated actions allow you to redirect users to specific pages for tasks like updating their profile, changing a password, or verifying an email address.
#7about 2 minutes
Configuring user profiles for incremental data collection
Keycloak's user profile feature enables defining custom user attributes and using scopes to implement incremental profiling, collecting data only when an application requires it.
#8about 3 minutes
Customizing login flows and exploring further capabilities
Beyond standard authentication, Keycloak allows for customizing login flows to restrict client access and provides built-in support for features like password resets and remember me.
Related jobs
Jobs that call for the skills explored in this talk.
Dev Digest 214: Claude Is Leaking, GitHub Is Listening & Axios Hacked!Inside last week’s Dev Digest 214 .
🕵️ Claude source code leaked, analysed and re-written in 2 days
🐙 GitHub auto-opts users into feeding their code to train their AI
🌐 Pretext shows how to show complex text rendering in the browser
🤖 How to securin...
Chris Heilmann
With AIs wide open - WeAreDevelopers at All Things Open 2025Last week our VP of Developer Relations, Chris Heilmann, flew to Raleigh, North Carolina to present at All Things Open . An excellent event he had spoken at a few times in the past and this being the “Lucky 13” edition, he didn’t hesitate to come and...
Christina Schaireiter
5 Reasons Why Attending Conferences in 2026 Matters More Than You ThinkIt’s 2026, and the “remote vs. office” debate has finally settled into a high-tech hybrid reality. While we’ve perfected the art of shipping production-grade code from decentralized hubs and home setups, something shifted. We realized that while AI c...
From learning to earning
Jobs that call for the skills explored in this talk.