The presentation aims to share experiences gained during the integration, upgrading, and operation of Keycloak, with particular focus on how we embedded the system into our existing architecture, the benefits we observed through centralized user and access management, and the challenges we faced when multiple version upgrades were missed. We will present how we managed the subsequent migration and the steps we took to strengthen security compliance.