Blog

Insights on Identity, Security & Keycloak

Tutorials, deep dives, and best practices from the Skycloak team.

security

JWT Token Lifecycle Management: Expiration, Refresh, and Revocation Strategies

Learn JWT token lifecycle management strategies including expiration policies, refresh token rotation, and revocation mechanisms for secure authentication systems.

Guilliano Molaire Guilliano Molaire 17 min read
Attribute
Tutorials

Using Custom User Attributes in Keycloak OIDC Tokens

Learn how to add custom user attributes to Keycloak OIDC tokens and map them to your client application. Includes Spring…

George Thomas George Thomas 4 min read
Attribute mapping from external IDP
Tutorials

Attribute Mapping in Keycloak During OIDC Identity Brokering

Learn how to map user attributes like email and phone number in Keycloak during OIDC identity brokering with external providers…

George Thomas George Thomas 4 min read
Inspect window extract
Tutorials

Use kc_idp_hint to Choose Identity Provider in Keycloak

Learn how to use kc_idp_hint in Keycloak to skip the login screen and redirect users directly to a specific identity…

Guilliano Molaire Guilliano Molaire 8 min read
guides

Authentication Technology Refresh: Modernization Planning and Timeline

Plan your authentication modernization with this step-by-step guide covering protocol selection, migration timelines, and compliance requirements.

Guilliano Molaire Guilliano Molaire 7 min read
Keycloak HIPAA Audit Logging: Meeting OCR Investigation Requirements
guides

Identity Service Procurement: Contract Negotiation and SLA Requirements

Navigate IAM procurement with essential contract negotiation strategies, SLA benchmarks, compliance requirements, and vendor evaluation best practices.

Guilliano Molaire Guilliano Molaire 6 min read
Request flow
Tutorials

Secure Your Spring Boot REST API with Keycloak Token

Secure your Spring Boot REST API using Keycloak Client Credentials Grant with OAuth2 Resource Server and role-based access control.

George Thomas George Thomas 6 min read
Tutorials

Restrict Keycloak Clients to Specific Users

Learn how to restrict Keycloak client access to specific users using client roles, custom authentication flows, and group-based access control.

George Thomas George Thomas 4 min read
Keycloak custom extensions
Tutorials

Using Email OTP Keycloak Extension with Skycloak

Learn how to install and configure the email OTP Keycloak extension with Skycloak to add email-based multi-factor authentication to your…

George Thomas George Thomas 3 min read
IAM Solutions ROI: Comparing Top Enterprise Options
business

IAM Solutions ROI: Comparing Top Enterprise Options

Compare the true ROI of Auth0, Okta, AWS Cognito, self-hosted Keycloak, and managed Keycloak to find the best enterprise IAM…

Guilliano Molaire Guilliano Molaire 10 min read

Stay ahead on identity & security

Get tutorials, product updates, and Keycloak tips delivered to your inbox.

© 2026 Skycloak. All Rights Reserved. Design by Yasser Soliman