]> Keycloak Reference Guide SSO for Web Apps and REST Services &project.version; Preface In some of the example listings, what is meant to be displayed on one line does not fit inside the available page width. These lines have been broken up. A '\' at the end of a line means that a break has been introduced to fit in the page, with the following lines indented. So: Let's pretend to have an extremely \ long line that \ does not fit This one is short Is really: Let's pretend to have an extremely long line that does not fit This one is short &License; &Overview; &Installation; &Providers; &OpenShift; &AdminPermissions; &PerRealmAdminPermissions; Adapters Keycloak can secure a wide variety of application types. This section defines which application types are supported and how to configure and install them so that you can use Keycloak to secure your applications. &AdapterConfig; &JBossAdapter; &TomcatAdapter; &Jetty9Adapter; &Jetty8Adapter; &FuseAdapter; &JavascriptAdapter; &SpringBootAdapter; &SpringSecurityAdapter; &InstalledApplications; &Logout; &MultiTenancy; &JAAS; &IdentityBroker; &Themes; &Recaptcha; Email Keycloak sends emails to users to verify their email address. Emails are also used to allow users to safely restore their username and passwords. &Email; &AccessTypes; &Roles; &DirectAccess; &CORS; &Timeouts; &AdminApi; &Events; &UserFederation; &Kerberos; &ExportImport; &AdminRecovery; &ServerCache; &SAML; &SecurityVulnerabilities; &Clustering; &ApplicationClustering; &Proxy; &CustomAttributes; &ProtocolMappers; &Migration;