Date: May 14, 2026 | Time: 10.05 – 10.30

Inalogy: Who Are You, Really? LoA from Governance to Auth Flow

Identity governance and authentication are often treated as separate concerns – but what if your IDM system could directly drive authentication strength? In this session, František Mikuš from Inalogy walks you through a real-world implementation where midPoint computes a user’s Level of Access (LoA 1–3) based on their roles and organizational context. Beyond the calculation, midPoint also orchestrates the necessary prerequisites – managing certificates (requesting them from a CA or issuing them directly for lower LoA levels) and assigning roles that govern which authentication factors, such as OTP, a user is permitted to use. Red Hat Build of Keycloak (RHBK) then takes midPoint’s output and enriches it with its own context – client configuration, realm settings, an IP address, and third-party integrations – to determine the final authentication requirements within a single, seamless flow. A key differentiator from built-in step-up authentication is the ability to distinguish between factors that are always required and those that are dynamic – meaning users are prompted only for what is genuinely missing, not forced to re-authenticate with factors already satisfied at a lower LoA. Attendees will leave with a concrete pattern for connecting identity governance from midPoint to adaptive authentication in RHBK – end-to-end, role-driven, and production-tested.

Taking the stage by storm

Meet the Speaker

František Mikuš

IDM Architect at Inalogy

František has rich experience with midPoint IdM, mainly in the enterprise environment. He has contributed the MS Graph API Connector, the Free IPA Connector, and the Adaptive SSH Connector. He is always eager to learn new things and share them with the community.