No description
Find a file
2015-03-18 09:43:53 +01:00
broker saml broker import/export, and module fixes 2015-03-17 19:20:46 -04:00
connections KEYCLOAK-1105 Refactor InMemoryModel to use a factory instead of a 2015-03-17 16:16:39 -04:00
core KEYCLOAK-1094 Rename k_idp_hint to kc_idp_hint 2015-03-16 20:00:20 +01:00
core-jaxrs
dependencies
distribution Merge pull request #1055 from ssilvert/KEYCLOAK-1105-refactor-InMemoryModel 2015-03-17 19:27:29 -04:00
docbook KEYCLOAK-1108 Remove option for enable/disable login per application 2015-03-18 09:43:53 +01:00
events
examples Fix broker packaging and facebook example 2015-03-17 10:55:06 +01:00
export-import
federation
forms Fix CSS of social buttons on login screen 2015-03-18 09:43:53 +01:00
integration saml broker import/export, and module fixes 2015-03-17 19:20:46 -04:00
misc
model Update federated links when identity provider alias is changed 2015-03-18 09:43:53 +01:00
picketlink
project-integrations
proxy
saml set saml issuer 2015-03-16 14:52:29 -04:00
server
services Update federated links when identity provider alias is changed 2015-03-18 09:43:53 +01:00
social
testsuite Fix CSS of social buttons on login screen 2015-03-18 09:43:53 +01:00
timer
.gitignore
.travis.yml
License.html
pom.xml KEYCLOAK-752 Upgrade Liquibase 2015-03-17 09:32:50 +01:00
README.md update readme features 2015-03-12 18:13:05 -04:00

keycloak

Please visit http://keycloak.org for more information on Keycloak including how to download, documentation, and video tutorials.

Keycloak is an SSO Service for web apps and REST services. It can be used for social applications as well as enterprise applications. It is based on OpenID Connect with support for SAML 2.0 as well. Here's some of the features:

  • SSO and Single Log Out for browser applications
  • Social Broker. Enable Google, Facebook, Yahoo, Twitter social login with no code required.
  • Optional LDAP/Active Directory integration
  • Optional User Registration
  • Password and TOTP support (via Google Authenticator or FreeOTP). Client cert auth coming soon.
  • User session management from both admin and user perspective
  • Customizable themes for user facing pages: login, grant pages, account management, emails, and admin console all customizable!
  • OAuth Bearer token auth for REST Services
  • Integrated Browser App to REST Service token propagation
  • Admin REST API
  • OAuth 2.0 Grant requests
  • CORS Support
  • CORS Web Origin management and validation
  • Completely centrally managed user and role mapping metadata. Minimal configuration at the application side
  • Admin Console for managing users, roles, role mappings, applications, user sessions, allowed CORS web origins, and OAuth clients.
  • Deployable as a WAR, appliance, or an Openshift cloud service (SaaS).
  • Supports JBoss AS7, EAP 6.x, Wildfly, Tomcat, and Jetty applications. Plans to support Node.js, RAILS, GRAILS, and other non-Java applications.
  • Javascript/HTML 5 adapter for pure Javascript apps
  • Session management from admin console
  • Revocation policies
  • Password policies
  • OpenID Connect Support
  • SAML Support
  • Token claim and SAML assertion mappings, role name mappings, etc. Ability to configure exactly what information you want in your tokens and SAML documents
  • IDP brokering or chaining. You can set up Keycloak to be a child IDP to another SAML or OIDC IDP.
  • Kerberos bridging. Logged in Kerberos users can access Keycloak SAML or OIDC applications via our Kerberos bridge.

Please visit http://keycloak.org for more information on Keycloak including how to download, documentation, and video tutorials.