Validating access tokens
You have two choices to validate an access token, either by invoking the token introspection endpoint provided by Keycloak or by directly verifying the token.
Using the token introspection endpoint is the simplest approach, and it also makes your applications less tied to Keycloak being the authorization server. OAuth 2.0 does not define a standard format for access tokens and these should be considered opaque to the application. Instead, it defines a standard token introspection endpoint that can be used to query the authorization server for the state of a token as well as claims associated with the token. This also enables tokens to not be self-contained, meaning that not all relevant information about the token is encoded into the token, but rather the token only serves as a reference to the information.
One downside of using the token introspection endpoint is that it introduces extra latency in processing the request as well as additional load...