
Custom extensions, API integrations, and seamless embedding into your system landscape.
Standard software often covers 90% – we close the last gap. We develop SPIs (Providers), connect Keycloak with your tools, and automate workflows.
From API integration to complete custom solutions – we cover the entire spectrum.
We make your systems talk to each other. Whether REST, GraphQL, or webhooks – we connect software with your CRM, ERP, or identity provider.
Often data formats from System A don't match System B. We develop middleware that sits in between, transforms data, and controls processes.
Want to use software features in your own intranet or customer portal? We embed software headlessly and build custom UIs around it.
Save manual work through intelligent automation. We develop bots and scripts that handle tasks automatically.
Keycloak is modular to the core. Almost every functionality is a replaceable provider. We use Java to implement these SPIs and adapt Keycloak exactly to your infrastructure.
The most important point: We don't necessarily migrate your users. We develop User Storage Providers allowing Keycloak to read users directly from your existing SQL DB, mainframe, or API – without duplication.
Audit compliance requires gapless logs. We write Event Listeners that stream every login, error, and admin action to your SIEM (Splunk, ELK, Graylog) in real-time.
The standard login window is off-putting. We develop responsive, accessible themes (based on your CI/CD) that seamlessly integrate the login experience into your application.
How we implement Keycloak development in practice.
You have thousands of users in an old MySQL database of an EOL software that cannot be migrated.
A 'read-only' User Storage SPI connects the old DB. Keycloak authenticates against old hashes but issues modern OAuth2/OIDC tokens for new apps.
B2C customers constantly forget passwords. The login process must be frictionless.
Implementation of a custom authentication flow that only asks for emails and sends magic links. Fully integrated into Keycloak core, secure, and audited.
Your application needs specific data in the JWT (e.g., tenant ID, cost center) not found in LDAP.
A Script Mapper (JavaScript) or Protocol Mapper (Java) loads this data from an external API during login and signs it into the access token.
Update-safe, scalable, and secure – why you should trust us with your development.
We don't modify the open-source software's source code. Instead, we use official APIs and plugin architectures. Your installation remains updatable and maintainable.
We understand not just the code, but the infrastructure beneath it. Our developers know how queries affect database performance and how to build scalable APIs.
We use modern, type-safe technologies: React, TypeScript, Node.js, Python, Go. Plus PostgreSQL, Redis, and Docker/Kubernetes for infrastructure.
Every line of code is written with security in mind. Input sanitization, secure authentication (OAuth2/OIDC), and compliance with data protection regulations are standard.
Our Tech Stack
From requirements to go-live – transparent and structured.
We review API documentation, analyze your requirements, and identify optimal integration points.
We design the solution: middleware, plugin, or script. Data flows, interfaces, and security concept are defined.
Agile implementation with code reviews, automated tests, and continuous coordination. You see progress in real-time.
Integration into your CI/CD pipeline or hosting on our infrastructure. Documentation and training included.
Let's get technical. We'll assess feasibility and effort.
Discover all Keycloak services from WZ-IT.
Whether a specific IT challenge or just an idea – we look forward to the exchange. In a brief conversation, we'll evaluate together if and how your project fits with WZ-IT.
Timo Wevelsiep & Robin Zins
CEOs of WZ-IT

