Speaker

Alexander Schwartz

Alexander Schwartz

Principal Software Engineer @ Red Hat

Principal Software Engineer @ Red Hat

Frankfurt am Main, Germany

Actions

Alexander Schwartz is a Principal Software Engineer at Red Hat working full time as a Keycloak maintainer and technical team lead. At work and in his spare time he codes for Open Source projects. In previous jobs he worked as a software architect and IT consultant. At conferences and user groups he talks about JavaScript front ends, Java back ends, Kubernetes and single-sign-on with Keycloak.

Bei Red Hat bin ich Principal Software Engineer Consultant und arbeite als Maintainer am Keycloak Projekt. In den vergangenen Jahren habe ich Softwareprojekte in verschiedenen Rollen als Entwickler, ScrumMaster, Architekt und Projektmanager begleitet. Web-Technologien waren immer das zentrale Thema. Ich schätze produktive Arbeitsumgebungen, agile Projekte und automatisierte Tests.

Area of Expertise

  • Information & Communications Technology

10 years of Keycloak - what's next for cloud-native authentication and OIDC?

More than 10 years ago the Keycloak maintainers committed the first code to their repository. In the following years Keycloak built a growing community offering a flexible Open Source solution for authentication based on OpenID Connect (OIDC), SAML and with integrations into the classic enterprise.

The ecosystem of OIDC and customer demands have evolved over the years, and so has Keycloak. After presenting some of the highlights of the latest Keycloak release, this talk focuses on the latest advancements in OIDC like DPoP, OIDC4IDA and FAPI 2.0, as well as Keycloak’s pursuit for scalability, high availability and a great user experience. We’ll also present the work-in-progress topics in a demo.

Anwendungsmetriken sammeln und auswerten mit Micrometer

Metriken sind neben Logging und Tracing ein wichtiger Pfeiler zur Überwachung der Anwendung. Mit Metriken können Probleme erkannt und Ressourcen-Engpässe identifiziert werden.
Das Projekt Micrometer bietet für Java-Anwendungen eine Fassade, mit der Metriken herstellerneutral in verschiedene Monitoring-Systeme geliefert werden können. Parallel zu Spring Boot Version 2.0 wurde Micrometer Version 1.0 veröffentlicht, welches nun die Standard-Bibliothek für Metriken in Spring Boot ist. Micrometer selbst kann unabhängig von Spring in allen Java-Projekten eingesetzt werden.
Damit versetzt es Teams in die Lage, technische und fachliche Metriken effizient zu sammeln und für eigene Auswertungen einzusetzen.
Der Vortrag stellt die Verwendung von Micrometer in Spring Boot vor und zeigt die Auswertung von Metriken mit Prometheus und Grafana.

ContribFest: Keycloak - Accelerate New Features, squash Bugs and Learn to Contribute

Keycloak is an Identity and Access Management (IAM) solution providing centralized authentication and authorization to applications and APIs. It recently joined the CNCF, and this ContribFest invites the community to contribute.

For those new to the project we will provide a tour of the repository and help set up development environments to begin contributing on some existing issues of outstanding technical debt. This is also the chance to improve Keycloak documentation for users and contributors.

For those that have some familiarity with Keycloak, we will spend time getting deeper in technical detail about how new features will be implemented and how they will fit together with Keycloak and its current capabilities.

Delegating the chores of authenticating users to Keycloak

Authenticating users can start simple with a username and a password for each user. But you will also need to handle forgotten passwords and user registration. You might also want to validate email addresses, add second factors, have users update their profile information as needed, or even offer password-less authentication.

A single-sign-on system like Keycloak can handle all that for you and will redirect users after they are authenticated to your applications using the industry standards like OpenID Connect and SAML.

Join this talk to see how you can delegate all the tasks around authentication to Keycloak. We will start simple and enable more and more features in our demo to show the functionality and flexibility of Keycloak. We will also look at features of the latest release and the road map ahead.

Evolving OpenID Connect and Observability in Keycloak

OpenID Connect and observability have evolved a lot over the past year in the Keycloak project.

Keycloak's OAuth Special Interest Group has contributed security features related to OAuth 2.0 and OpenID Connect. We will demonstrate OAuth 2.0 Demonstrating Proof of Possession to make single page applications and native applications more secure, and OpenID Federation 1.0 support for building trust relationships between OpenID Providers and Relying Parties.

For better observability Keycloak now provides a full guide on how to use metrics for Service Level Indicators (SLI), Service Level Objectives (SLO), troubleshooting and sizing, together with example Grafana dashboards. Users will learn how they can utilise the Keycloak metrics and Grafana dashboards to identify excess request latencies that breach their SLO, we will then demonstrate how OpenTelemetry tracing can help debug the root cause of such breaches.

Online-Dokumentation die hilft: Strukturen und Prozesse

Mal eben etwas in der Online-Dokumentation für Nutzer ergänzen und schon ist es live? Und das so geschrieben und strukturiert, dass Nutzer wirklich davon profitieren?
Der Vortrag zeigt, mit welchen Strukturen und Vorlagen Änderungen an Dokumentation vereinfacht und automatisiert geprüft werden können.
Als Werkzeuge kommen AsciiDoc, Antora und weitere Werkzeuge aus diesem Ökosystem zum Einsatz. Als Beispiel dienen verschiedene Open-Source-Projekte, und es werden öffentlich verfügbare Online-Ressourcen zum Thema vorgestellt.

Start Your Engines: White Box Monitoring for Your Load Tests

You think monitoring is only for production? Wrong: Add a metrics endpoint to your application to get insights during your load tests - and use them for free to monitor production!

This talk shows how to setup up the load testing tools JMeter and Gatling to push their metrics to Prometheus. It also makes the case to expose metrics as part of core application development instead of treating them as a small add-on before go-live.

By providing end-to-end examples, this talk enables developers of Vert.x and Spring based Java applications to make their application ready for production with Prometheus and Grafana.

This talk also contains a lessons learned for this approach what worked well and what to watch out for.

Running a highly available Identity and Access Management with Keycloak

A single sign on solution for your customers and employees should be designed for high availability without a single point of failure. Keycloak is no exception to this.
A clustered Keycloak deployment in a single site provides sufficient availability for many. An increasing number of organizations need to utilize multiple sites for improved resiliency or to meet legal requirements. Keycloak overhauled its capabilities and now provides deployment blueprints to the community.
This talk presents how we approached the problem, and the challenges we faced. Expect to dive into concepts like load shedding, cache stampedes, and automated failover. See tools like Gatling, Helm, OpenTelemetry, Kubernetes Operators and cloud infrastructure in action. We will also provide an outlook for the next steps in our journey.
These insights will help you to improve your Keycloak deployments as well as design and test your own applications so they can withstand high load and site failures.

Wie wir unsere Test-Pipeline stabilisierten

Je größer ein Projekt wird, desto mehr Testfälle gibt es, und desto länger dauert meist auch die Ausführung. Instabile Tests und abbrechende Builds werden dann zu einem großen Ärgernis, das für Frustration sorgt.

Im Open-Source-Projekt Keycloak sind wir das Problem in in 2023 neu angegangen: Statt abbrechender Builds gibt es bei uns nun kontrollierte Wiederholungen, Protokollierung und Überwachung, und das ganze automatisiert über Maven und GitHub-APIs. Builds brechen dadurch seltener ab, und instabile Tests können besser identifiziert und angegangen werden.

Der Vortrag stellt unsere Lösung im Detail vor und berichtet über die Erfahrungen damit. Alle Teile sind öffentlich auf GitHub verfügbar.

BaselOne 2023 Sessionize Event

October 2023 Basel, Switzerland

BED-Con 2023 Sessionize Event

September 2023 Berlin, Germany

J-Fall 2021 Sessionize Event

November 2021 Ede, The Netherlands

BED-Con 2019 Sessionize Event

September 2019 Berlin, Germany

microXchg 2018 Sessionize Event

April 2019

Alexander Schwartz

Principal Software Engineer @ Red Hat

Frankfurt am Main, Germany

Actions

Please note that Sessionize is not responsible for the accuracy or validity of the data provided by speakers. If you suspect this profile to be fake or spam, please let us know.

Jump to top