Keycloak Migration Made Easy: Tips and Best Practices

Here we’ll explore the most significant changes introduced in recent Keycloak releases and how they impact migration efforts. We’ll walk through practical examples to resolve common challenges, ensuring a smooth transition to newer versions. Whether it’s adapting to updated configurations or managing deprecated features, this post should provide additional tips…

Andrzej Chybicki: The groundbreaking change brought by MCP and technologies based on LLM is the reduction of the communication barrier between humans and IT systems

We invite you to read an interview with Andrzej Chybicki, CEO of Inero Software, where we delve deeper into the practical applications of MCP.

Keycloak: Smart Tips for Monitoring and Protection with Built-in Configuration Tools

Keycloak is not just a powerful identity and access management tool; it’s also essential for monitoring performance and enhancing security, particularly when defending against phishing attacks. With its built-in monitoring and alerting mechanisms, administrators can detect suspicious user activities and maintain optimal system performance.  Andrzej Chybicki CEO Inero Software Keycloak…