No description
Find a file
Eivind Mikkelsen 24a2773524 Add SAML NameID Formats and include certificate in signature
The NameID Format in the AuthnRequest NameIDPolicy is now respected,
and support has been added for the following NameID Formats:

  - urn:oasis:names:tc:SAML:1.1:nameid-format:unspecified
  - urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress
  - urn:oasis:names:tc:SAML:2.0:nameid-format:transient

The persistent NameID format was previously used in all responses
and mapped to the principal's username. Now, unspecified is mapped
to the principal's username and used by default if no NameIDPolicy
is specified by the SP.

The persistent format requires generating a pseudo-random identifier
that must be generated by the IdP on first login and stored in the
user's profile. Persistent NameID Format is not yet implemented.

The certificate is now added to the signature to enable support for
integration with Service Providers where only the IdP's certificate
fingerprint is configured (e.g. Zendesk).
2014-11-12 01:24:51 +01:00
connections Fix for sybase 2014-11-04 14:47:51 +01:00
core KEYCLOAK-835 Move AdapterConstants to different package 2014-11-10 22:16:20 +01:00
core-jaxrs Version bump 2014-11-04 09:01:06 +01:00
dependencies Version bump 2014-11-04 09:01:06 +01:00
distribution merge 2014-11-10 17:09:00 -05:00
docbook final jetty stuff 2014-11-07 21:10:15 -05:00
events Version bump 2014-11-04 09:01:06 +01:00
examples KEYCLOAK-835 Move AdapterConstants to different package 2014-11-10 22:16:20 +01:00
export-import KEYCLOAK-820 Don't expose realm private key through admin endpoints 2014-11-05 15:34:56 +01:00
federation Fix failing tests 2014-11-11 15:17:32 +01:00
forms KEYCLOAK-827 add entryDN as one of attributes, which can be mapped to username 2014-11-11 13:20:12 +01:00
integration merge 2014-11-10 17:09:00 -05:00
misc KEYCLOAK-736 Database migration support" 2014-10-14 10:07:41 +02:00
model KEYCLOAK-824 Wrong digit shown in Invalid Password message 2014-11-06 12:30:24 +01:00
picketlink Upgrade to picketlink 2.7.0.CR2 and minor LDAP improvements 2014-11-11 12:58:49 +01:00
project-integrations Version bump 2014-11-04 09:01:06 +01:00
saml Add SAML NameID Formats and include certificate in signature 2014-11-12 01:24:51 +01:00
server Version bump 2014-11-04 09:01:06 +01:00
services KEYCLOAK-835 Move AdapterConstants to different package 2014-11-10 22:16:20 +01:00
social Version bump 2014-11-04 09:01:06 +01:00
testsuite Fix failing tests 2014-11-11 15:17:32 +01:00
timer Version bump 2014-11-04 09:01:06 +01:00
.gitignore Old experiment with keycloak-server.json embedded into standalone.xml 2014-11-05 08:31:05 -05:00
License.html distro 2014-01-07 14:37:50 -05:00
pom.xml Upgrade to picketlink 2.7.0.CR2 and minor LDAP improvements 2014-11-11 12:58:49 +01:00
README.md update readme 2014-11-10 17:11:07 -05:00

keycloak

Please visit http://keycloak.org for more information on Keycloak including how to download, documentation, and video tutorials.

Keycloak is an SSO Service for web apps and REST services. It can be used for social applications as well as enterprise applications. It is based on OpenID Connect with support for SAML 2.0 as well. Here's some of the features:

  • SSO and Single Log Out for browser applications
  • Social Broker. Enable Google, Facebook, Yahoo, Twitter social login with no code required.
  • Optional LDAP/Active Directory integration
  • Optional User Registration
  • Password and TOTP support (via Google Authenticator or FreeOTP). Client cert auth coming soon.
  • User session management from both admin and user perspective
  • Customizable themes for user facing pages: login, grant pages, account management, emails, and admin console all customizable!
  • OAuth Bearer token auth for REST Services
  • Integrated Browser App to REST Service token propagation
  • Admin REST API
  • OAuth 2.0 Grant requests
  • CORS Support
  • CORS Web Origin management and validation
  • Completely centrally managed user and role mapping metadata. Minimal configuration at the application side
  • Admin Console for managing users, roles, role mappings, applications, user sessions, allowed CORS web origins, and OAuth clients.
  • Deployable as a WAR, appliance, or an Openshift cloud service (SaaS).
  • Supports JBoss AS7, EAP 6.x, Wildfly, Tomcat, and Jetty applications. Plans to support Node.js, RAILS, GRAILS, and other non-Java applications.
  • Javascript/HTML 5 adapter for pure Javascript apps
  • Session management from admin console
  • Revocation policies
  • Password policies
  • OpenID Connect Support
  • SAML Support

Please visit http://keycloak.org for more information on Keycloak including how to download, documentation, and video tutorials.