eupolicy.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
This Mastodon server is a friendly and respectful discussion space for people working in areas related to EU policy. When you request to create an account, please tell us something about you.

Server stats:

225
active users

#keycloak

1 post1 participant0 posts today
Silke Meyer<p>Für "Identity Broker"-Szenarien mit Keycloak finde ich die Doku von Red Hat empfehlenswert. Dort ist verhältnismäßig gut beschrieben, wie man das Durchreichen von Claims/Attributen von einem Identity Provider durch einen anderen zu einem Client konfiguriert.</p><p><a href="https://docs.redhat.com/en/documentation/red_hat_build_of_keycloak/26.0/html/server_administration_guide/identity_broker" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">docs.redhat.com/en/documentati</span><span class="invisible">on/red_hat_build_of_keycloak/26.0/html/server_administration_guide/identity_broker</span></a></p><p><a href="https://univention.social/tags/keycloak" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>keycloak</span></a> <a href="https://univention.social/tags/singlesignon" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>singlesignon</span></a> <a href="https://univention.social/tags/iam" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>iam</span></a> <a href="https://univention.social/tags/oidc" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>oidc</span></a> <a href="https://univention.social/tags/saml" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>saml</span></a></p>
Christoph<p>Kurzer Nachtrag, ich möchte ja auch Lösungen liefern: </p><p>Sollte jemand interesse an einer skalierbaren, sicheren und preiswerten Infrastruktur inkl. Chat, Video, Cloud (inkl Collabora), Wiki, Mastodon, sowie Groupware (open XChange) und IDM an alle Dienste interessiert sein, gerne melden. Wir haben dieses System letztes Jahr mit dem Relaunch des NABU-Netz komplett auf open-source Basis für mehrere tausend Personen bereits umgesetzt. </p><p><a href="https://digitalcourage.social/tags/opensource" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>opensource</span></a> <a href="https://digitalcourage.social/tags/naturschutz" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>naturschutz</span></a> <a href="https://digitalcourage.social/tags/datenschutz" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>datenschutz</span></a> <a href="https://digitalcourage.social/tags/kubernetes" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>kubernetes</span></a> <a href="https://digitalcourage.social/tags/opencloud" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>opencloud</span></a> <a href="https://digitalcourage.social/tags/matrix" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>matrix</span></a> <a href="https://digitalcourage.social/tags/keycloak" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>keycloak</span></a> <a href="https://digitalcourage.social/tags/bookstack" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>bookstack</span></a> <a href="https://digitalcourage.social/tags/opentofu" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>opentofu</span></a> <a href="https://digitalcourage.social/tags/openxchange" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>openxchange</span></a> <a href="https://digitalcourage.social/tags/mastodon" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>mastodon</span></a> <a href="https://digitalcourage.social/tags/jitsi" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>jitsi</span></a></p>
Max Maass :donor:<p>Looking forward to being at <a href="https://infosec.exchange/tags/KeyConf25" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>KeyConf25</span></a> and meeting all the interesting people there! My colleague Tim and I will be presenting our <a href="https://infosec.exchange/tags/Keycloak" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Keycloak</span></a> config auditor tool, <a href="https://infosec.exchange/tags/kcwarden" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>kcwarden</span></a>, that helps you keep your server configuration secure. <a href="https://github.com/iteratec/kcwarden" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">github.com/iteratec/kcwarden</span><span class="invisible"></span></a><br><a href="https://fosstodon.org/@ahus1/114753988086598591" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">fosstodon.org/@ahus1/114753988</span><span class="invisible">086598591</span></a></p>
Alexander Schwartz<p>The talks have now been announced for KEYCONF25, the annual one-day conference about <a href="https://fosstodon.org/tags/Keycloak" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Keycloak</span></a>! Secure your ticket for August 28 in Amsterdam now!</p><p>Join this one-day conference to learn how to manage <a href="https://fosstodon.org/tags/identities" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>identities</span></a>, use it in AI and non-AI scenarios, scale and manage it with great <a href="https://fosstodon.org/tags/observability" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>observability</span></a>, and run it securely with confidence!</p><p>Last but not least, the the "Meet the maintainers" panel to ask live questions.</p><p>See you all in Amsterdam soon!</p><p><a href="https://keyconf.dev/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">keyconf.dev/</span><span class="invisible"></span></a></p>
Pass the SALT Conference<p>Today, let's have a look on our <a href="https://infosec.exchange/tags/pts25" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>pts25</span></a> AUDIT &amp; HARDENING session!</p><p>- Kévin Schouteeten from <span class="h-card" translate="no"><a href="https://bird.makeup/users/synacktiv" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>synacktiv</span></a></span> will help to audit <a href="https://infosec.exchange/tags/Keycloak" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Keycloak</span></a> configs with hashtag#Neo4j 🔦 <br>- Rémi Gacogne from <a href="https://infosec.exchange/tags/ArchLinux" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ArchLinux</span></a> security team will explain us how they manage to sandbox pacman, ArchLinux packinging manager. Using Landlock among others tools 🛠️ <br>- Yves Rutschle &amp; Eddie BILLOIR will present RootAsRole to simplify privileges management ✊ <br>- <span class="h-card" translate="no"><a href="https://infosec.exchange/@guedou" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>guedou</span></a></span> and Gaetan Ferry will expose how to track secrets leaks in online code &amp; containers registries 🎯</p><p>⚠️ Available seats are disappearing quickly! </p><p>🎟️Book your free seat: <a href="https://pretix.eu/passthesalt/2025/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">pretix.eu/passthesalt/2025/</span><span class="invisible"></span></a> <br>📖Schedule: <a href="https://cfp.pass-the-salt.org/pts2025/schedule/#" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">cfp.pass-the-salt.org/pts2025/</span><span class="invisible">schedule/#</span></a> <br>📅July 1 to 3, 2025 <br>📍Lille, FR</p><p>RT appreciated🙏</p>
Silke Meyer<p>Inzwischen hatte ich übrigens Zeit, mit dem Keycloak Auditor kcwarden von <span class="h-card" translate="no"><a href="https://infosec.exchange/@hacksilon" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>hacksilon</span></a></span> und seinem Kollegen herumzuspielen. Ein super Tool, um zu prüfen, wo man die oft sehr laxen Standardeinstellungen nachjustieren sollte!</p><p>Repo: <a href="https://github.com/iteratec/kcwarden" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">github.com/iteratec/kcwarden</span><span class="invisible"></span></a></p><p>Vortrag: <a href="https://www.youtube.com/watch?v=PRvHLx5oCj4" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">youtube.com/watch?v=PRvHLx5oCj</span><span class="invisible">4</span></a></p><p>(Und hinterher bitte testen, ob alles noch geht, besonders bei den RedirectURIs. 😉)</p><p><a href="https://univention.social/tags/keycloak" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>keycloak</span></a> <a href="https://univention.social/tags/itsecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>itsecurity</span></a> <a href="https://univention.social/tags/sso" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>sso</span></a> <a href="https://univention.social/tags/singlesignon" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>singlesignon</span></a> <a href="https://univention.social/tags/freesoftware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>freesoftware</span></a></p>
La Contre-Voie<p>Nous avons développé le plugin keycloak-altcha, un captcha pour <a href="https://toot.aquilenet.fr/tags/Keycloak" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Keycloak</span></a> basé sur <a href="https://toot.aquilenet.fr/tags/ALTCHA" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ALTCHA</span></a> :<br><a href="https://git.lacontrevoie.fr/lacontrevoie/keycloak-altcha" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">git.lacontrevoie.fr/lacontrevo</span><span class="invisible">ie/keycloak-altcha</span></a><br><a href="https://altcha.org/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">altcha.org/</span><span class="invisible"></span></a></p><p>Il ne nécessite pas de résoudre un puzzle ou de cliquer sur des feux de signalisation, mais simplement d’attendre quelques secondes : c’est un captcha « proof-of-work ».</p><p>Il fonctionne de la même manière que le plugin Anubis, utilisé par de nombreux logiciels libres ces derniers mois.</p><p>Nous accueillerions volontiers des contributions au code :)</p>
pink<p><span class="h-card" translate="no"><a href="https://s.pebcak.de/@winni" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>winni</span></a></span> According to the data sheet <span class="h-card" translate="no"><a href="https://social.opencloud.eu/@OpenCloud" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>OpenCloud</span></a></span> provides <a href="https://norden.social/tags/MFA" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>MFA</span></a> natively or through <a href="https://norden.social/tags/Keycloak" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Keycloak</span></a> <br><a href="https://docs.opencloud.eu/docs/admin/welcome/datasheet#security" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">docs.opencloud.eu/docs/admin/w</span><span class="invisible">elcome/datasheet#security</span></a></p>
Andi Barth<p>Are there "recommended authentication setups" for <a href="https://muenchen.social/tags/keycloak" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>keycloak</span></a>? Seems like I'm a bit lost. I'd like an user to be able to login with any two of password, mailadress, OTP token (and (re)set the third one) - or if only two are set, with any one of them. Or do I hold it wrong? (And if the mail adress is unknow, create the account instead of giving an error.)</p>
Kevin Veen-Birkenbach<p>Lausche dem folgenden Talk mit <span class="h-card" translate="no"><a href="https://mastodon.social/@philipkristians" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>philipkristians</span></a></span> auf der <a href="https://microblog.veen.world/tags/rp25" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>rp25</span></a>: <a href="https://re-publica.com/de/session/mastodon-offene-infrastrukturen-fuer-alle" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">re-publica.com/de/session/mast</span><span class="invisible">odon-offene-infrastrukturen-fuer-alle</span></a> <br><a href="https://microblog.veen.world/tags/Mastodon" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Mastodon</span></a> ist eine Kernkomponente die mit <a href="https://microblog.veen.world/tags/CyMaIS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyMaIS</span></a> via <a href="https://microblog.veen.world/tags/LDAP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>LDAP</span></a>, <a href="https://microblog.veen.world/tags/Keycloak" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Keycloak</span></a> und <a href="https://microblog.veen.world/tags/SSO" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SSO</span></a> zum aufsetzen einer <a href="https://microblog.veen.world/tags/SocialMedia" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SocialMedia</span></a> Infrastruktur auf Basis von <a href="https://microblog.veen.world/tags/ActivityPub" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ActivityPub</span></a> genutzt werden kann.</p><p>- <a href="https://github.com/kevinveenbirkenbach/cymais/tree/master/roles/docker-mastodon" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.com/kevinveenbirkenbach</span><span class="invisible">/cymais/tree/master/roles/docker-mastodon</span></a> (Code)<br>- <a href="https://microblog.cymais.cloud/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">microblog.cymais.cloud/</span><span class="invisible"></span></a> (Demo)</p>
Silke Meyer<p>Guten Morgen! Am 11. Juni findet wieder meine ganztägige Keycloak-Schulung statt und es gibt noch ein paar freie Plätze. Die Zielgruppe sind Admin*s, die den von <span class="h-card" translate="no"><a href="https://univention.social/@univention" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>univention</span></a></span> ausgelieferten Keycloak in Verbindung mit UCS einsetzen. SSO-Vorkenntnisse sind nicht nötig. Falls noch jemand teilnehmen möchte, sind hier die Details zur Anmeldung:</p><p><a href="https://www.univention.de/training/keycloak/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">univention.de/training/keycloa</span><span class="invisible">k/</span></a></p><p><a href="https://univention.social/tags/Keycloak" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Keycloak</span></a> <a href="https://univention.social/tags/singlesignon" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>singlesignon</span></a> <a href="https://univention.social/tags/oidc" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>oidc</span></a> <a href="https://univention.social/tags/saml" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>saml</span></a> <a href="https://univention.social/tags/univention" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>univention</span></a></p>
Vladimir Marinkovic<p>Blogged: kickstarter guide for using Keycloak as identity provider</p><p><a href="https://cleverheap.com/posts/keycloak-with-aspnet-webapi/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">cleverheap.com/posts/keycloak-</span><span class="invisible">with-aspnet-webapi/</span></a></p><p><a href="https://mastodon.social/tags/keycloak" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>keycloak</span></a> <a href="https://mastodon.social/tags/blog" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>blog</span></a> <a href="https://mastodon.social/tags/dotnet" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>dotnet</span></a> <a href="https://mastodon.social/tags/aspnet" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>aspnet</span></a> <a href="https://mastodon.social/tags/oidc" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>oidc</span></a> <a href="https://mastodon.social/tags/oauth2" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>oauth2</span></a></p>
meissa-team<p>We cleaned up our forgejo setup &amp; noted down the steps needed to sso intrgrate forgejo in keycloak:</p><p><a href="https://domaindrivenarchitecture.org/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">domaindrivenarchitecture.org/</span><span class="invisible"></span></a></p><p><a href="https://social.meissa-gmbh.de/tags/forgejo" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>forgejo</span></a> <a href="https://social.meissa-gmbh.de/tags/sso" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>sso</span></a> <a href="https://social.meissa-gmbh.de/tags/keycloak" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>keycloak</span></a></p>
Benjamin<p>I just heard from someone else: "This is not possible, it's all or nothing within a realm."</p><p>Is this real? Did KeyCloak, acting as an IDP, REALLY decide to just not do ANY kind of "this &lt;set of&gt; users may log in to an application, and everyone else may not"?</p><p><a href="https://toot.berlin/tags/Keycloak" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Keycloak</span></a></p>
Benjamin<p>Is it like actually POSSIBLE to restrict user access to ANY client in Keycloak?<br>So far I find a lot of answers to this question, many of which are many years old, but none work.<br>No matter what policies I configure, I keep being able to log in to an application even though it feels like I shouldn't be.</p><p>Restriction access to clients should not be this hard.</p><p><a href="https://toot.berlin/tags/Keycloak" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Keycloak</span></a> <a href="https://toot.berlin/tags/IAM" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IAM</span></a></p>
ip6li 🚴🏻 🐧 🇩🇪<p><span class="h-card" translate="no"><a href="https://sueden.social/@cycletux" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>cycletux</span></a></span> <span class="h-card" translate="no"><a href="https://zug.network/@Zugschlus" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>Zugschlus</span></a></span> Ich würde die ganze Groupware Plattform z.B. bei <span class="h-card" translate="no"><a href="https://social.heinlein-support.de/@heinleinsupport" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>heinleinsupport</span></a></span> hosten lassen, natürlich alles Open-Source und <a href="https://mastodon.social/tags/Microsoft" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Microsoft</span></a> frei. Als IAM bietet sich <a href="https://mastodon.social/tags/Keycloak" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Keycloak</span></a> an, das kann man z.B. mit OpenID/Connect für alle möglichen Web-Anwendungen verwenden.</p>
nameliviaI started replacing google as identity provider for a self-hosted <a class="hashtag" href="https://pleroma.namelivia.com/tag/keycloak" rel="nofollow noopener noreferrer" target="_blank">#keycloak</a> instance.<br><br>With that I would say I would have 100% degoogled mysef.<br><a class="hashtag" href="https://pleroma.namelivia.com/tag/degoogle" rel="nofollow noopener noreferrer" target="_blank">#degoogle</a> <a class="hashtag" href="https://pleroma.namelivia.com/tag/selfhosted" rel="nofollow noopener noreferrer" target="_blank">#selfhosted</a>
Markus Feilner<p>Nice. <a href="https://mastodon.social/tags/opencloud" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>opencloud</span></a> <a href="https://mastodon.social/tags/keycloak" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>keycloak</span></a> </p><p><a href="https://docs.opencloud.eu/docs/admin/configuration/authentication-and-user-management/keycloak/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">docs.opencloud.eu/docs/admin/c</span><span class="invisible">onfiguration/authentication-and-user-management/keycloak/</span></a></p>
OpenTalk<p>Secure authentication, full control: OpenTalk chooses Keycloak</p><p>The Cloud Native Computing Foundation case study shows how we use Keycloak to implement centralized identity and access management that meets the highest security requirements, improves the user experience, and strengthens digital sovereignty.</p><p>👉 To the case study: <a href="https://www.cncf.io/case-studies/opentalk/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="">cncf.io/case-studies/opentalk/</span><span class="invisible"></span></a><br><a href="https://social.opentalk.eu/tags/Keycloak" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Keycloak</span></a> <a href="https://social.opentalk.eu/tags/CNCF" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CNCF</span></a></p>
OpenTalk<p>Sichere Authentifizierung, volle Kontrolle: OpenTalk setzt auf Keycloak</p><p>Die Case Study der Cloud Native Computing Foundation zeigt, wie wir mit Keycloak eine zentrale Identitäts- und Zugriffsverwaltung realisieren, die höchsten Sicherheitsanforderungen gerecht wird, die Nutzererfahrung verbessert und gleichzeitig die digitale Souveränität stärkt.</p><p>👉 Zur Case Study: <a href="https://www.cncf.io/case-studies/opentalk/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="">cncf.io/case-studies/opentalk/</span><span class="invisible"></span></a><br><a href="https://social.opentalk.eu/tags/Keycloak" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Keycloak</span></a> <a href="https://social.opentalk.eu/tags/CNCF" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CNCF</span></a></p>