WZ-IT Logo
{}
</>
Keycloak

Keycloak Development & Integration

Custom extensions, API integrations, and seamless embedding into your system landscape.

Standard software often covers 90% – we close the last gap. We develop SPIs (Providers), connect Keycloak with your tools, and automate workflows.

API IntegrationCustom MiddlewareAutomationUpdate-safe
Development Services

Our Development Services

From API integration to complete custom solutions – we cover the entire spectrum.

API & Interface Integration

We make your systems talk to each other. Whether REST, GraphQL, or webhooks – we connect software with your CRM, ERP, or identity provider.

  • Bidirectional data synchronization
  • Third-party system connections
  • Custom webhooks & event handlers
  • Legacy system integrations

Custom Middleware & Logic

Often data formats from System A don't match System B. We develop middleware that sits in between, transforms data, and controls processes.

  • Transformation layer (ETL)
  • Data stream validation
  • Caching layer for performance
  • Microservices architecture

Embeddings & Custom Apps

Want to use software features in your own intranet or customer portal? We embed software headlessly and build custom UIs around it.

  • White-label integration
  • Custom dashboards (React/Vue)
  • UI extension via plugins
  • Mobile app customizations

Automation & Bots

Save manual work through intelligent automation. We develop bots and scripts that handle tasks automatically.

  • ChatOps & slash commands
  • Automated reporting
  • Workflow orchestration
  • Trigger-based actions
Architecture & Interfaces

Service Provider Interfaces (SPI)

Keycloak is modular to the core. Almost every functionality is a replaceable provider. We use Java to implement these SPIs and adapt Keycloak exactly to your infrastructure.

User Storage SPI

The most important point: We don't necessarily migrate your users. We develop User Storage Providers allowing Keycloak to read users directly from your existing SQL DB, mainframe, or API – without duplication.

Event Listener SPI

Audit compliance requires gapless logs. We write Event Listeners that stream every login, error, and admin action to your SIEM (Splunk, ELK, Graylog) in real-time.

Custom Themes (Freemarker)

The standard login window is off-putting. We develop responsive, accessible themes (based on your CI/CD) that seamlessly integrate the login experience into your application.

Practical Examples

Concrete Use Cases

How we implement Keycloak development in practice.

Federation with Legacy Systems

Problem

You have thousands of users in an old MySQL database of an EOL software that cannot be migrated.

Solution

A 'read-only' User Storage SPI connects the old DB. Keycloak authenticates against old hashes but issues modern OAuth2/OIDC tokens for new apps.

Passwordless Auth & Magic Links

Problem

B2C customers constantly forget passwords. The login process must be frictionless.

Solution

Implementation of a custom authentication flow that only asks for emails and sends magic links. Fully integrated into Keycloak core, secure, and audited.

Token Enrichment (Mappers)

Problem

Your application needs specific data in the JWT (e.g., tenant ID, cost center) not found in LDAP.

Solution

A Script Mapper (JavaScript) or Protocol Mapper (Java) loads this data from an external API during login and signs it into the access token.

Why WZ-IT

Development with Foresight

Update-safe, scalable, and secure – why you should trust us with your development.

Update-safe (No Core Hacking)

We don't modify the open-source software's source code. Instead, we use official APIs and plugin architectures. Your installation remains updatable and maintainable.

Full-Stack Expertise

We understand not just the code, but the infrastructure beneath it. Our developers know how queries affect database performance and how to build scalable APIs.

Modern Tech Stack

We use modern, type-safe technologies: React, TypeScript, Node.js, Python, Go. Plus PostgreSQL, Redis, and Docker/Kubernetes for infrastructure.

Security by Design

Every line of code is written with security in mind. Input sanitization, secure authentication (OAuth2/OIDC), and compliance with data protection regulations are standard.

Our Tech Stack

ReactTypeScriptNode.jsPythonGoPostgreSQLRedisDockerKubernetes
Our Process

How We Work

From requirements to go-live – transparent and structured.

01

Analysis

We review API documentation, analyze your requirements, and identify optimal integration points.

02

Architecture

We design the solution: middleware, plugin, or script. Data flows, interfaces, and security concept are defined.

03

Development

Agile implementation with code reviews, automated tests, and continuous coordination. You see progress in real-time.

04

Deployment

Integration into your CI/CD pipeline or hosting on our infrastructure. Documentation and training included.

Planning a custom extension?

Let's get technical. We'll assess feasibility and effort.

1/2 – Interest50%

Response within 24h – no spam, no sales pressure.

Industry-leading companies rely on us

  • Rekorder
  • Keymate
  • Führerscheinmacher
  • SolidProof
  • ARGE
  • Boese VA
  • NextGym
  • Maho Management
  • Golem.de
  • Millenium
  • Paritel
  • Yonju
  • EVADXB
  • Mr. Clipart
  • Aphy
  • Negosh

What do our customers say?

Let's Talk About Your Idea

Whether a specific IT challenge or just an idea – we look forward to the exchange. In a brief conversation, we'll evaluate together if and how your project fits with WZ-IT.

E-Mail
[email protected]

Trusted by leading companies

  • Rekorder
  • Keymate
  • Führerscheinmacher
  • SolidProof
  • ARGE
  • Boese VA
  • NextGym
  • Maho Management
  • Golem.de
  • Millenium
  • Paritel
  • Yonju
  • EVADXB
  • Mr. Clipart
  • Aphy
  • Negosh
Timo Wevelsiep & Robin Zins - CEOs of WZ-IT

Timo Wevelsiep & Robin Zins

CEOs of WZ-IT

1/3 – Topic Selection33%

What is your inquiry about?

Select one or more areas where we can support you.