Keycloak was just the beginning. Meet Keymate.
Estimated read: 6–7 minutes
After years building identity and authorization often on Keycloak we kept hitting the same wall: RBAC role explosion, multi-tenancy & delegation gaps, and invisible policy decisions. "Rip-and-replace" is risky; "do nothing" is riskier. Keymate emerged from a simple idea: Don't replace your IAM. layer intelligence and visibility on top of it, run in parallel, and make access explainable and governable.
📧 Following this series? Get the next chapter when it drops → insights on modern IAM and authorization patterns.

Can your IAM tell you who got access, when, in what context, and why without a war room?
When a request is denied, can you answer "why denied?" in seconds with evidence?
Can you separate tenants cleanly and delegate administration without spreadsheets?
Can you version, approve, and roll back policies like real software artifacts?
Can you enforce at the edge (API Gateway/Service Mesh) without touching app code?
Could you run next to your legacy IAM in parallel, compare decisions, and cut over gradually?
Can your IAM surface anomalies or explain access in plain English — AI-assisted, human-governed — without turning governance into a black box?
If any of those are a "not really," you're in good company.
We've spent years writing identity and authorization first homegrown, then on Keycloak across our own products and client projects, wearing different hats. We've seen Keycloak lift heavy loads, and we've also seen the same missing pieces repeat in real enterprise environments.
We didn't want "another IAM". We wanted a governed, explainable authorization layer that sits on top of what you already have.
We learned a hard truth: confidence in authorization doesn’t come from more roles; it comes from context, lifecycle, and visibility.

Roles multiply as systems and use-cases grow. The more roles you add, the fuzzier your intent becomes. Without first-class context attributes, relationships, risk you're stuck between over-granting or drowning in exceptions.
📊 At one recent scale: ~120 tenants, 9 apps, ~650 roles (+35% YoY) the sprawl became the work.

B2B/B2B2C/G2C topologies require strict tenant isolation, organizational hierarchy, and clean delegation. Without a crisp model, operations slide back to ad-hoc emails and manual approvals brittle, slow, and audit-unfriendly.

Policies should behave like software: versioned, reviewed, approved, tested, rolled back. In practice, approvals are informal, diffs get lost, and when access is denied there's no explainable trace to show which rule fired. If decisions aren't observable, risk management turns into guesswork.
Policies should be treated like code — think “GitHub for authorization”: diffs, pull requests, reviews, and rollbacks.
Technical debt rarely disappears; it usually migrates.
👉 We needed a third way: augment, don't replace.
We framed our goal (Ends) and our approach (Means) in plain terms:
Non-negotiable Principles:
Because we didn't need another identity provider. We needed a thinking, visible, governable authorization layer that lets enterprises:
This is the first chapter in a longer journey. Next up:

Get the next chapter when it drops, plus insights on modern IAM and authorization patterns.
Stay updated with our latest insights and product updates