Blog

Insights on Identity, Security & Keycloak

Tutorials, deep dives, and best practices from the Skycloak team.

best-practices

Testing Keycloak: Automated Validation with Testcontainers, Postman, and Cypress

Learn Keycloak testing and automated validation strategies using Testcontainers, Postman, and Cypress to build reliable identity infrastructure.

Guilliano Molaire Guilliano Molaire 12 min read
best-practices

Scaling Keycloak: Clustering, Caching, and Load Testing for Production

Learn how to scale Keycloak for production with clustering, Infinispan caching, database optimization, and load testing strategies.

Guilliano Molaire Guilliano Molaire 12 min read
automated-idp
guides

OIDC Discovery and Dynamic Registration: Automating Identity Provider Configuration

Automate identity provider configuration with OIDC Discovery and Dynamic Client Registration to reduce errors, improve security, and scale efficiently.

Guilliano Molaire Guilliano Molaire 11 min read
security

Session Management in Distributed Systems: Cookies vs Tokens vs Server-Side Sessions

Compare cookies, tokens, and server-side sessions for distributed systems with security analysis, scalability trade-offs, and Keycloak session management.

Guilliano Molaire Guilliano Molaire 12 min read
security

JWT Token Lifecycle Management: Expiration, Refresh, and Revocation Strategies

Learn JWT token lifecycle management strategies including expiration policies, refresh token rotation, and revocation mechanisms for secure authentication systems.

Guilliano Molaire Guilliano Molaire 17 min read
Attribute
Tutorials

Using Custom User Attributes in Keycloak OIDC Tokens

Learn how to add custom user attributes to Keycloak OIDC tokens and map them to your client application. Includes Spring…

George Thomas George Thomas 4 min read
Attribute mapping from external IDP
Tutorials

Attribute Mapping in Keycloak During OIDC Identity Brokering

Learn how to map user attributes like email and phone number in Keycloak during OIDC identity brokering with external providers…

George Thomas George Thomas 4 min read
Inspect window extract
Tutorials

Use kc_idp_hint to Choose Identity Provider in Keycloak

Learn how to use kc_idp_hint in Keycloak to skip the login screen and redirect users directly to a specific identity…

Guilliano Molaire Guilliano Molaire 8 min read
guides

Authentication Technology Refresh: Modernization Planning and Timeline

Plan your authentication modernization with this step-by-step guide covering protocol selection, migration timelines, and compliance requirements.

Guilliano Molaire Guilliano Molaire 7 min read
Keycloak HIPAA Audit Logging: Meeting OCR Investigation Requirements
guides

Identity Service Procurement: Contract Negotiation and SLA Requirements

Navigate IAM procurement with essential contract negotiation strategies, SLA benchmarks, compliance requirements, and vendor evaluation best practices.

Guilliano Molaire Guilliano Molaire 6 min read

Stay ahead on identity & security

Get tutorials, product updates, and Keycloak tips delivered to your inbox.

© 2026 Skycloak. All Rights Reserved. Design by Yasser Soliman