No description
Find a file
Stian Thorgersen 39c0be5d99 KEYCLOAK-652
Social user can't set password
2014-08-29 16:51:10 +02:00
connections Rename audit to events 2014-08-28 10:56:37 +02:00
core Added password token to use inplace of plain-text password for totp 2014-08-28 13:51:55 +02:00
core-jaxrs
dependencies Rename audit to events 2014-08-28 10:56:37 +02:00
distribution
docbook Rename audit to events 2014-08-28 10:56:37 +02:00
events Rename audit to events 2014-08-28 10:56:37 +02:00
examples Fixes to event-store-mem example 2014-08-29 14:55:45 +02:00
export-import Rename audit to events 2014-08-28 10:56:37 +02:00
federation KEYCLOAK-643 Handle flows with adding user with existing username or email in federation providers 2014-08-27 12:19:23 +02:00
forms KEYCLOAK-652 2014-08-29 16:51:10 +02:00
integration Merge branch 'master' of https://github.com/ungarida/keycloak into ungarida-master 2014-08-28 14:29:07 +02:00
misc/logo
model KEYCLOAK-649 Invalidate realm if app name or client clientId is changed 2014-08-29 15:49:17 +02:00
picketlink KEYCLOAK-646 Fix LDAP authentication when there are commas in the value of bindingProperty 2014-08-27 12:19:23 +02:00
project-integrations
server Rename audit to events 2014-08-28 10:56:37 +02:00
services KEYCLOAK-652 2014-08-29 16:51:10 +02:00
social
testsuite Fix test 2014-08-29 08:59:57 +02:00
timer KEYCLOAK-531 Reduce info level logging 2014-08-27 11:17:24 +02:00
.gitignore
License.html
pom.xml Rename audit to events 2014-08-28 10:56:37 +02:00
README.md

keycloak

Please visit http://keycloak.org for more information on Keycloak including how to download, documentation, and video tutorials.

Keycloak is an SSO Service for web apps and REST services. It can be used for social applications as well as enterprise applications. It is based on OpenID Connect with SAML support in the works. Here's some of the features:

  • SSO and Single Log Out for browser applications
  • Social Broker. Enable Google, Facebook, Yahoo, Twitter social login with no code required.
  • Optional LDAP/Active Directory integration
  • Optional User Registration
  • Password and TOTP support (via Google Authenticator). Client cert auth coming soon.
  • User session management from both admin and user perspective
  • Customizable themes for user facing pages: login, grant pages, account management, emails, and admin console all customizable!
  • OAuth Bearer token auth for REST Services
  • Integrated Browser App to REST Service token propagation
  • Admin REST API
  • OAuth 2.0 Grant requests
  • CORS Support
  • CORS Web Origin management and validation
  • Completely centrally managed user and role mapping metadata. Minimal configuration at the application side
  • Admin Console for managing users, roles, role mappings, applications, user sessions, allowed CORS web origins, and OAuth clients.
  • Deployable as a WAR, appliance, or an Openshift cloud service (SaaS).
  • Supports JBoss AS7, EAP 6.x, and Wildfly applications. Plans to support Node.js, RAILS, GRAILS, and other non-Java applications.
  • Javascript/HTML 5 adapter for pure Javascript apps
  • Session management from admin console
  • Revocation policies
  • Password policies
  • OpenID Connect Support

Please visit http://keycloak.org for more information on Keycloak including how to download, documentation, and video tutorials.