Halil Özkan
Keymate – Modern Authorization for Developers
#1about 2 minutes
The challenges of traditional in-code authorization logic
Hardcoded authorization checks quickly become unscalable and untestable, leading to a problem known as role explosion.
#2about 1 minute
Introducing Keymate for zero-rewrite authorization on Keycloak
Keymate extends Keycloak to provide fine-grained authorization without requiring application rewrites or data migration from existing identity providers.
#3about 1 minute
Externalizing authorization with service mesh and API gateways
Moving authorization logic out of the application code and into the infrastructure layer like a service mesh allows developers to focus on business logic.
#4about 1 minute
Using SDKs for optional fine-grained in-code control
For cases requiring more control, Keymate provides SDKs for Java, .NET, and JavaScript that support both REST and gRPC protocols.
#5about 1 minute
Leveraging an event-driven architecture for observability
Keymate is built on an event-driven model and uses OpenTelemetry to provide observability and enable parallel runs with existing systems for smooth migration.
Related jobs
Jobs that call for the skills explored in this talk.
Matching moments
23:10 MIN
A modern approach using a decoupled authorization service
Un-complicate authorization maintenance
28:28 MIN
Implementing decoupled authorization with the sidecar pattern
Un-complicate authorization maintenance
39:50 MIN
Using the open source project Cerbos for authorization
Un-complicate authorization maintenance
02:21 MIN
An overview of Keycloak for identity management
Keycloak case study: Making users happy with service level indicators and observability
01:51 MIN
The challenges of embedding authorization in application code
Decoupled Authorization using Policy as Code
04:57 MIN
Introducing Policy as Code and Open Policy Agent
Decoupled Authorization using Policy as Code
22:09 MIN
Centralizing security services in a Kubernetes ecosystem
DevSecOps: Security in DevOps
41:16 MIN
Answering audience questions on authorization best practices
Un-complicate authorization maintenance
Featured Partners
Related Videos
Delegating the chores of authenticating users to Keycloak
Alexander Schwartz
Un-complicate authorization maintenance
Alex Olivier
Keycloak case study: Making users happy with service level indicators and observability
Alexander Schwartz
Decoupled Authorization using Policy as Code
Anderson Dadario & Denys Vitali
Application Modernization Leveraging Gen-AI for Automated Code Transformation
Syed M Shaaf
Kalo: From Code Chaos to One-Click Polyglot Codegen
Brennan Nunamaker
Delay the AI Overlords: How OAuth and OpenFGA Can Keep Your AI Agents from Going Rogue
Deepu
Get started with securing your cloud-native Java microservices applications
Thomas Südbröcker
From learning to earning
Jobs that call for the skills explored in this talk.

Identity and Acces Management (Azure/Office 365 + GCP)
Kapres Technology
Municipality of Madrid, Spain
Azure
Microsoft Access
Microsoft Office


Backend JAVA Developer - Identity & Access Management (IAM)
Sterrk
Groningen, Netherlands
Remote
€4-7K
Intermediate
Java
Azure
Scrum
+6



Senior IAM-Berater - Red Hat SSO (Keycloak) in SB
Ebcont Group
Saarbrücken, Germany
Senior
DevOps
Microsoft Office
Agile Methodologies
Red Hat Enterprise Linux - RHEL



Senior (Lead) Softwareentwickler IAM/Keycloak (all genders)
init AG
Mainz, Germany
Senior
Java
Spring
Continuous Integration