par Mathieu PASSENAUD | Jan 26, 2026 | Gestion des Identités
Keycloak OAuth2-Proxy Configuration Generator: with our main partner Please-Open.It we strongly advocate the use of authentication proxy pattern. As we mentioned in our authentication proxy article, this architectural approach is one of the most efficient ways to...
par Mathieu PASSENAUD | Déc 24, 2025 | Communauté, Gestion des Identités, Open Source, Sécurité, SSO
How to simplify authentication in any application with an authentication proxy ? With our main partner please-open.it, we implement authentication solutions for applications across various languages and frameworks. Over the years, we’ve encountered the same challenges...
par Mathieu PASSENAUD | Oct 13, 2025 | Gestion des Identités, Open Source, SSO
With our partner please-open.it we implement everything necessary for our customers’ use cases. Many times we have to make custom workflows as : “when a user registers, create it in Hubspot”. How to make your custom workflow with Keycloak ? There is an interesting...
par Mathieu PASSENAUD | Août 6, 2025 | Gestion des Identités, Open Source, Sécurité, SSO
A custom http header to token claim mapper for Keycloak : Our main partner please-open-it implement everything necessary for our customers’ use cases. And one of our clients asked us: how to pass the locale when authenticating in “client_credentials”? Use case A...
par Mathieu PASSENAUD | Août 6, 2025 | Communauté, Gestion des Identités, SSO
A JWT decoder in the system tray, tips and tricks from our main partner Please-Open-IT to enhance your productivity setting up KeycCloak. With our customers, we decode JWT tokens dozens of times a day. We were tired of opening jwt.io each time so we built a simple...
par Loïc Mercier Des Rochettes | Juin 5, 2025 | Communauté, Gestion des Identités, SSO
Keycloak User Agent Filter Authenticator: our main partner, Please Open It, created an authenticator that filters the user-agent header for Keycloak to exclude embedded webviews, ensuring compliance with specification requirements. The component reduces the attack...
par Mathieu PASSENAUD | Déc 10, 2024 | Gestion des Identités, Open Source, SSO
Keycloak roles restriction and full scopes : for security concerns, you must restrict roles to a subset through the « Full Scope Allowed » Switch as by default a client has « roles » scope as « default » so that a user will have all affected clients roles in its...
par Loïc Mercier Des Rochettes | Oct 3, 2024 | Communauté, Gestion des Identités, LDAP, Open Source, SSO
Get rid of your old Active directory/LDAP with keycloak and a small piece of custom software : just a POC for a LDAP bind proxy to log to KeyCloak with LDAP. TL;DR How to spawn a simple bind LDAP proxy for keycloak OIDC password grant in a nutshell. Disclaimer and...
par Mathieu PASSENAUD | Août 21, 2024 | Communauté, Open Source, SSO
This article will share how to enrich native metrics in Keycloak with Micrometer and add yours. Special thanks Thanks to all contributors who built one of the most use Keycloak plugin : https://github.com/aerogear/keycloak-metrics-spi TL/DR We developed a new metrics...
par Mathieu PASSENAUD | Mar 7, 2024 | Gestion des Identités, Open Source, SSO
In this article we will explain through an example what is and how to use Keycloak Authenticator. In Keycloak, an « authenticator » is a step in an authentication process, what we call « Authentication flow ». An impressive list of authenticators are available with...
par Mathieu PASSENAUD | Déc 1, 2023 | Communauté, Gestion des Identités, Sécurité, SSO
This article to share how we use Keycloak OIDC authentication with N8N workflow used internally. Please Open It has its own instance of n8n for internal automations : billing, emails etc… Connecting applications to each other is simpler, especially on data management...
par Mathieu PASSENAUD | Nov 13, 2023 | Communauté, Gestion des Identités, Sécurité, SSO
After many years in consulting, how we build our own authorizations platform using KeyCloak. Authn VS Authz First of all, we have to define with a high precision where the authentication stops and where authorization starts. Sometimes you can see posts about : ABAC :...
par Mathieu PASSENAUD | Oct 10, 2023 | Communauté, Gestion des Identités, Sécurité
As is, Keycloak has a default configuration which can introduce security flaws despite your manual testing, that why our partner Please Open It developed this Keycloak Config Checker to help you enforce your security practices. Default configurations As is, Keycloak...
par Mathieu PASSENAUD | Sep 19, 2023 | Communauté, Gestion des Identités, SSO
This article describes how to use your Keycloak or RedHat SSO as SSO for Airtable. Only available for the « entreprise » plan, you can add your own SSO to your Airtable organization. SSO feature in Airtable Airtable has in their « entreprise » plan a support of SAML...
par Mathieu PASSENAUD | Fév 7, 2023 | Communauté, Gestion des Identités, Sécurité, SSO
You can use the SSH connection with OAuth2 authentication method to connect to Keycloak with SSH. This requires that you generate an SSH key pair and register it in your Keycloak account. You will then need to configure your SSH client to use the OAuth2 authentication...