keycloak-scim/docs/documentation/securing_apps/topics/overview/getting-started.adoc
Douglas Palmer b2f09feebf Remove servlet filter saml adapters
Closes #28786

Signed-off-by: Douglas Palmer <dpalmer@redhat.com>
2024-04-26 09:30:35 +02:00

56 lines
No EOL
1.6 KiB
Text

=== Getting Started
The link:{quickstartRepo_link}[{quickstartRepo_name}] provides examples about how to secure applications and services
using different programming languages and frameworks. By going through their documentation and codebase, you will
understand the bare minimum changes required in your application and service in order to secure it with {project_name}.
Also, see the following sections for recommendations for trusted and well-known client-side implementations for both OpenID
Connect and SAML protocols.
==== OpenID Connect
ifeval::[{project_community}==true]
===== Java
* {quickstartRepo_link}/tree/latest/jakarta/servlet-authz-client[Wildfly Elytron OIDC]
* {quickstartRepo_link}/tree/latest/spring/rest-authz-resource-server[Spring Boot]
* <<_jboss_adapter, {project_name} Wildfly Adapter>> (Deprecated)
endif::[]
===== JavaScript (client-side)
* <<_javascript_adapter,JavaScript>>
===== Node.js (server-side)
* <<_nodejs_adapter,Node.js>>
ifeval::[{project_community}==true]
===== C#
* https://github.com/dylanplecki/KeycloakOwinAuthentication[OWIN]
===== Python
* https://pypi.org/project/oic/[oidc]
===== Android
* https://github.com/openid/AppAuth-Android[AppAuth]
===== iOS
* https://github.com/openid/AppAuth-iOS[AppAuth]
===== Apache HTTP Server
* https://github.com/OpenIDC/mod_auth_openidc[mod_auth_openidc]
endif::[]
==== SAML
===== Java
* <<_saml_jboss_adapter,JBoss EAP>>
ifeval::[{project_community}==true]
* <<_saml_jboss_adapter,WildFly>>
endif::[]
ifeval::[{project_community}==true]
===== Apache HTTP Server
* <<_mod_auth_mellon,mod_auth_mellon>>
endif::[]