No description
Find a file
2015-03-04 10:38:39 -05:00
broker ProviderFactory.postInit() 2015-02-23 12:11:48 -05:00
connections Fix boolean type - was causing issues on some dbs i.e. PostgreSQL 2015-03-04 12:50:03 +01:00
core KEYCLOAK-1015 Allow configuring login timeout separate to login actions 2015-03-04 08:45:01 +01:00
core-jaxrs
dependencies Kerberos automated test 2015-02-23 13:13:34 +01:00
distribution Kerberos fixes for jboss-modules refactoring. Fix environment specific test failures 2015-02-25 22:36:27 +01:00
docbook Removed reference to auth-server.war in appliance docs 2015-03-04 15:19:00 +01:00
events [KEYCLOAK-1036] - Revert. 2015-02-25 11:21:56 -03:00
examples fix SAML examples 2015-03-04 10:38:06 -05:00
export-import ProviderFactory.postInit() 2015-02-23 12:11:48 -05:00
federation Kerberos fixes for jboss-modules refactoring. Fix environment specific test failures 2015-02-25 22:36:27 +01:00
forms KEYCLOAK-1014 Don't redirect to app after reset password or verify email if new browser session 2015-03-04 13:39:11 +01:00
integration Fix showing federation links of users in admin console 2015-02-11 13:03:31 +01:00
misc
model KEYCLOAK-1015 Allow configuring login timeout separate to login actions 2015-03-04 08:45:01 +01:00
picketlink ProviderFactory.postInit() 2015-02-23 12:11:48 -05:00
project-integrations ProviderFactory.postInit() 2015-02-23 12:11:48 -05:00
proxy
saml refactor mappers 2015-03-03 20:38:28 -05:00
server
services KEYCLOAK-1014 Don't redirect to app after reset password or verify email if new browser session 2015-03-04 13:39:11 +01:00
social [KEYCLOAK-883] - Code cleanup and refactoring. 2015-02-13 01:27:11 -02:00
testsuite KEYCLOAK-1014 Don't redirect to app after reset password or verify email if new browser session 2015-03-04 13:39:11 +01:00
timer ProviderFactory.postInit() 2015-02-23 12:11:48 -05:00
.gitignore
.travis.yml
License.html
pom.xml Updated target java to 1.7 2015-02-26 10:26:07 +01:00
README.md

keycloak

Please visit http://keycloak.org for more information on Keycloak including how to download, documentation, and video tutorials.

Keycloak is an SSO Service for web apps and REST services. It can be used for social applications as well as enterprise applications. It is based on OpenID Connect with support for SAML 2.0 as well. Here's some of the features:

  • SSO and Single Log Out for browser applications
  • Social Broker. Enable Google, Facebook, Yahoo, Twitter social login with no code required.
  • Optional LDAP/Active Directory integration
  • Optional User Registration
  • Password and TOTP support (via Google Authenticator or FreeOTP). Client cert auth coming soon.
  • User session management from both admin and user perspective
  • Customizable themes for user facing pages: login, grant pages, account management, emails, and admin console all customizable!
  • OAuth Bearer token auth for REST Services
  • Integrated Browser App to REST Service token propagation
  • Admin REST API
  • OAuth 2.0 Grant requests
  • CORS Support
  • CORS Web Origin management and validation
  • Completely centrally managed user and role mapping metadata. Minimal configuration at the application side
  • Admin Console for managing users, roles, role mappings, applications, user sessions, allowed CORS web origins, and OAuth clients.
  • Deployable as a WAR, appliance, or an Openshift cloud service (SaaS).
  • Supports JBoss AS7, EAP 6.x, Wildfly, Tomcat, and Jetty applications. Plans to support Node.js, RAILS, GRAILS, and other non-Java applications.
  • Javascript/HTML 5 adapter for pure Javascript apps
  • Session management from admin console
  • Revocation policies
  • Password policies
  • OpenID Connect Support
  • SAML Support

Please visit http://keycloak.org for more information on Keycloak including how to download, documentation, and video tutorials.