Providers and SPIs
Keycloak is designed to cover most use-cases without requiring custom code, but we also want it to be
customizable. To achive this Keycloak has a number of SPIs which you can implement your own providers for.
Implementing a SPI
To implement an SPI you need to implement it's ProviderFactory and Provider interfaces. You also need to
create a provider-configuration file. For example to implement the Event Listener SPI you need to implement
EventListenerProviderFactory and EventListenerProvider and also provide the file
META-INF/services/org.keycloak.events.EventListenerProviderFactory
For example to implement the Event Listener SPI you start by implementing EventListenerProviderFactory:
events;
public String getId() {
return "my-event-listener";
}
public void init(Config.Scope config) {
int max = config.getInt("max");
events = new MaxList(max);
}
public EventListenerProvider create(KeycloakSession session) {
return new MyEventListenerProvider(events);
}
public void close() {
events = null;
}
}
}]]>
The example uses an imagined MaxList which has a maximum size and is concurrency safe. When the maximum size is reached
and new entries are added the oldest entry is removed. Keycloak creates a single instance of
EventListenerProviderFactory which makes it possible to store state for multiple requests. EventListenerProvider
instances are created by calling create on the factory for each requests so these should be light-weight.
Next you would implement EventListenerProvider:
events;
public MyEventListenerProvider(List events) {
this.events = events;
}
@Override
public void onEvent(Event event) {
events.add(event);
}
@Override
public void close() {
}
}
}]]>
The file META-INF/services/org.keycloak.events.EventListenerProviderFactory should
contain the full name of your ProviderFactory implementation:
Registering provider implementations
Keycloak can load provider implementations from JBoss Modules or directly from the file-system. Using Modules
is recommended as you can control exactly what classes are available to your provider. Any providers loaded
from the file-system uses a classloader with the Keycloak classloader as its parent.
Register a provider using Modules
To register a provider using Modules first create a module. To do this you have to create a folder inside
KEYCLOAK_HOME/modules and add your jar and a module.xml. For example to add the event listener
sysout example provider create the folder KEYCLOAK_HOME/modules/org/keycloak/examples/event-sysout/main.
Copy event-listener-sysout-example.jar to this folder and create module.xml
with the following content:
}]]>
Next you need to register this module with Keycloak. This is done by editing keycloak-server.json and adding
it to the providers:
Register a provider using file-system
To register your provider simply copy the JAR including the ProviderFactory and Provider classes and the
provider configuration file to standalone/configuration/providers.
You can also define multiple provider class-path if you want to create isolated class-loaders. To do this
edit keycloak-server.json and add more classpath entries to the providers array. For example:
The above example will create two separate class-loaders for providers. The classpath entries follow the
same syntax as Java classpath, with ';' separating multiple-entries. Wildcard is also supported allowing
loading all jars (files with .jar or .JAR extension) in a folder, for example:
Configuring a provider
You can pass configuration options to your provider by setting them in keycloak-server.json.
For example to set the max value for my-event-listener add:
Available SPIs
Here's a list of the available SPIs and a brief description. For more details on each SPI refer to
individual
sections.
Account
Provides the account manage console pages. The default implementation uses FreeMarker templates.
Connections Infinispan
Loads and configures Infinispan connections. The default implementation can load connections
from
the Infinispan subsystem, or alternatively can be manually configured in keycloak-server.json.
Connections Jpa
Loads and configures Jpa connections. The default implementation can load datasources
from
WildFly/EAP, or alternatively can be manually configured in keycloak-server.json.
Connections Jpa Updater
Updates database schema. The default implementation uses Liquibase.
Connections Mongo
Loads and configures MongoDB connections. The default implementation is configured in
keycloak-server.json.
Email
Formats and sends email. The default implementation uses FreeMarker templates and JavaMail.
Events Listener
Listen to user related events for example user login success and failures. Keycloak provides two
implementations out of box. One that logs events to the server log and another that can send
email
notifications to users on certain events.
Events Store
Store user related events so they can be viewed through the admin console and account management
console.
Keycloak provides implementations for Relational Databases and MongoDB.
Export
Exports the Keycloak database. Keycloak provides implementations that export to JSON files
either
as a single file, multiple files in a directory or a encrypted ZIP archive.
Import
Imports an exported Keycloak database. Keycloak provides implementations that import from JSON
files either
as a single file, multiple files in a directory or a encrypted ZIP archive.
Login
Provides the login pages. The default implementation uses FreeMarker templates.
Login Protocol
Provides protocols. Keycloak provides implementations of OpenID Connect and SAML 2.0.
Realm
Provides realm and application meta-data. Keycloak provides implementations for Relational
Databases
and MongoDB.
Realm Cache
Caches realm and application meta-data to improve performance. Keycloak provides a basic
in-memory
cache and a Infinispan cache.
Theme
Allows creating themes to customize look and feel. Keycloak provides implementations that can
load
themes from the file-system or classpath.
Timer
Executes scheduled tasks. Keycloak provides a basic implementation based on java.util.Timer.
User
Provides users and role-mappings. Keycloak provides implementations for Relational Databases
and MongoDB.
User Cache
Caches users and role-mappings to improve performance. Keycloak provides a basic in-memory
cache and a Infinispan cache.
User Federation
Support syncing users from an external source. Keycloak provides implementations for LDAP and
Active Directory.
User Sessions
Provides users session information. Keycloak provides implementations for basic in-memory,
Infinispan,
Relational Databases and MongoDB