User Managed Access (UMA) Keycloak case histories in IoT sector

Hello, we’re looking to use Keycloak for authorization of our deployed base of IoT resources. I’m very interested to find out more about user’s real-world experience of using Keycloak UMA at scale, in terms of its robustness and suitability for this type of application. Would greatly welcome any advice and links to active deployments. Many thanks!