]> Keycloak Reference Guide SSO for Web Apps and REST Services &project.version; Preface In some of the example listings, what is meant to be displayed on one line does not fit inside the available page width. These lines have been broken up. A '\' at the end of a line means that a break has been introduced to fit in the page, with the following lines indented. So: Let's pretend to have an extremely \ long line that \ does not fit This one is short Is really: Let's pretend to have an extremely long line that does not fit This one is short &License; &Overview; &Installation; &Providers; &OpenShift; &AdminPermissions; &PerRealmAdminPermissions; Adapters Keycloak can secure a wide variety of application types. This section defines which application types are supported and how to configure and install them so that you can use Keycloak to secure your applications. These client adapters use an extension of the OpenID Connect protocol (a derivate of OAuth 2.0). This extension provides support for clustering, backchannel logout, and other non-standard adminstrative functions. The Keycloak project also provides a separate, standalone, generic, SAML client adapter. But that is describe in a separate document and has a different download. &AdapterConfig; &JBossAdapter; &TomcatAdapter; &Jetty9Adapter; &Jetty8Adapter; &FilterAdapter; &FuseAdapter; &JavascriptAdapter; &SpringBootAdapter; &SpringSecurityAdapter; &InstalledApplications; &Logout; &ErrorHandling; &MultiTenancy; &JAAS; &ClientRegistration; &IdentityBroker; &Themes; &Clients; &Recaptcha; Email Keycloak sends emails to users to verify their email address. Emails are also used to allow users to safely restore their username and passwords. &Email; &AccessTypes; &Roles; &Groups; &DirectAccess; &ServiceAccounts; &CORS; &Timeouts; &AdminApi; &Events; &UserFederation; &Kerberos; &ExportImport; &AdminRecovery; &ServerCache; &SAML; &SecurityVulnerabilities; &Clustering; &ApplicationClustering; &Proxy; &CustomAttributes; &ProtocolMappers; &AuthSPI; &Migration;