7e8018c7ca
- Store in config map in database and model - Expose the field in the OIDC-IDP - Write logic for import, force and legacy mode - Show how mappers can be updated keeping correct legacy mode - Show how mappers that work correctly don't have to be modified - Log an error if sync mode is not supported Fix updateBrokeredUser method for all mappers - Allow updating of username (UsernameTemplateMapper) - Delete UserAttributeStatementMapper: mapper isn't even registered Was actually rejected but never cleaned up: https://github.com/keycloak/keycloak/pull/4513 The mapper won't work as specified and it's not easy to tests here - Fixup json mapper - Fix ExternalKeycloakRoleToRoleMapper: Bug: delete cannot work - just delete it. Don't fix it in legacy mode Rework mapper tests - Fix old tests for Identity Broker: Old tests did not work at all: They tested that if you take a realm and assign the role, this role is then assigned to the user in that realm, which has nothing to do with identity brokering Simplify logic in OidcClaimToRoleMapperTests - Add SyncMode tests to most mappers Added tests for UsernameTemplateMapper Added tests to all RoleMappers Add test for json attribute mapper (Github as example) - Extract common test setup(s) - Extend admin console tests for sync mode Signed-off-by: Martin Idel <external.Martin.Idel@bosch.io> |
||
---|---|---|
.travis | ||
adapters | ||
authz | ||
boms | ||
common | ||
core | ||
dependencies | ||
distribution | ||
docs | ||
examples | ||
federation | ||
integration | ||
misc | ||
model | ||
quarkus | ||
saml-core | ||
saml-core-api | ||
server-spi | ||
server-spi-private | ||
services | ||
testsuite | ||
themes | ||
util | ||
wildfly | ||
.gitattributes | ||
.gitignore | ||
.travis.yml | ||
ADOPTERS.md | ||
CONTRIBUTING.md | ||
get-version.sh | ||
GOVERNANCE.md | ||
LICENSE.txt | ||
MAINTAINERS.md | ||
maven-settings.xml | ||
package-lock.json | ||
pom.xml | ||
prod-arguments.json | ||
README.md | ||
release.sh | ||
set-version.sh | ||
travis-run-tests.sh |
Keycloak
Keycloak is an Open Source Identity and Access Management solution for modern Applications and Services.
This repository contains the source code for the Keycloak Server, Java adapters and the JavaScript adapter.
Help and Documentation
- Documentation
- User Mailing List - Mailing list for help and general questions about Keycloak
- JIRA - Issue tracker for bugs and feature requests
Reporting Security Vulnerabilities
If you've found a security vulnerability, please look at the instructions on how to properly report it
Reporting an issue
If you believe you have discovered a defect in Keycloak please open an issue in our Issue Tracker. Please remember to provide a good summary, description as well as steps to reproduce the issue.
Getting started
To run Keycloak download the distribution from our website. Unzip and run:
bin/standalone.[sh|bat]
Alternatively, you can use the Docker image by running:
docker run jboss/keycloak
For more details refer to the Keycloak Documentation.
Building from Source
To build from source refer to the building and working with the code base guide.
Testing
To run tests refer to the running tests guide.
Writing Tests
To write tests refer to the writing tests guide.
Contributing
Before contributing to Keycloak please read our contributing guidelines.
Other Keycloak Projects
- Keycloak - Keycloak Server and Java adapters
- Keycloak Documentation - Documentation for Keycloak
- Keycloak QuickStarts - QuickStarts for getting started with Keycloak
- Keycloak Containers - Container images for Keycloak
- Keycloak Gatekeeper - Proxy service to secure apps and services with Keycloak
- Keycloak Node.js Connect - Node.js adapter for Keycloak
- Keycloak Node.js Admin Client - Node.js library for Keycloak Admin REST API