keycloak-scim/docs/documentation/securing_apps/topics/overview/getting-started.adoc
mposolda bbd4b60163 Update documentation after adapters removal
closes #28792

Signed-off-by: mposolda <mposolda@gmail.com>
2024-05-21 09:34:48 +02:00

55 lines
No EOL
1.5 KiB
Text

=== Getting Started
The link:{quickstartRepo_link}[{quickstartRepo_name}] provides examples about how to secure applications and services
using different programming languages and frameworks. By going through their documentation and codebase, you will
understand the bare minimum changes required in your application and service in order to secure it with {project_name}.
Also, see the following sections for recommendations for trusted and well-known client-side implementations for both OpenID
Connect and SAML protocols.
==== OpenID Connect
ifeval::[{project_community}==true]
===== Java
* {quickstartRepo_link}/tree/latest/jakarta/servlet-authz-client[Wildfly Elytron OIDC]
* {quickstartRepo_link}/tree/latest/spring/rest-authz-resource-server[Spring Boot]
endif::[]
===== JavaScript (client-side)
* <<_javascript_adapter,JavaScript>>
===== Node.js (server-side)
* <<_nodejs_adapter,Node.js>>
ifeval::[{project_community}==true]
===== C#
* https://github.com/dylanplecki/KeycloakOwinAuthentication[OWIN]
===== Python
* https://pypi.org/project/oic/[oidc]
===== Android
* https://github.com/openid/AppAuth-Android[AppAuth]
===== iOS
* https://github.com/openid/AppAuth-iOS[AppAuth]
===== Apache HTTP Server
* https://github.com/OpenIDC/mod_auth_openidc[mod_auth_openidc]
endif::[]
==== SAML
===== Java
* <<_saml_jboss_adapter,JBoss EAP>>
ifeval::[{project_community}==true]
* <<_saml_jboss_adapter,WildFly>>
endif::[]
ifeval::[{project_community}==true]
===== Apache HTTP Server
* <<_mod_auth_mellon,mod_auth_mellon>>
endif::[]