No description
Find a file
2015-04-01 15:56:52 -04:00
broker KEYCLOAK-1151 AuthorizationURL for custom social logins should perserve query parameters 2015-04-01 11:00:02 +02:00
connections Fix to db changelog 2015-04-01 07:36:58 +02:00
core Fix Cors example 2015-04-01 16:28:09 +02:00
core-jaxrs Version bump 2015-01-12 10:35:50 +01:00
dependencies KEYCLOAK-1046 - StackOverflow social login provider implementation 2015-03-23 17:48:26 +01:00
distribution disable token exchange ui/example 2015-04-01 15:56:52 -04:00
docbook Added instructions on deploying provider examples using jboss-cli 2015-04-01 14:22:17 +02:00
events Removed admin audit events - need to rethink how to implement it 2015-03-31 14:37:54 +02:00
examples Fix Cors example 2015-04-01 16:28:09 +02:00
export-import i18n for default claims 2015-03-29 11:34:53 +02:00
federation Minor improvements for kerberos 2015-03-12 09:12:16 +01:00
forms disable token exchange ui/example 2015-04-01 15:56:52 -04:00
integration KEYCLOAK-1171 Missing parameters: response_type login to oauth-client and oauth-client-cdi 2015-04-01 13:50:50 +02:00
misc Update Travis CI config 2015-01-27 13:20:49 +01:00
model Merge branch 'KEYCLOAK-1113' of https://github.com/velias/keycloak into velias-KEYCLOAK-1113 2015-04-01 09:45:13 +02:00
picketlink Fix databases, mongo, infinispan and active directory 2015-03-23 12:57:01 +01:00
project-integrations Update theme examples for new theme structure 2015-03-23 11:10:15 +01:00
proxy fix other claims in IDToken 2015-03-04 20:27:06 -05:00
saml expire cookie on backchannel 2015-03-31 19:33:43 -04:00
server Minor fixes in kerberos example 2015-03-10 12:44:41 +01:00
services Merge remote-tracking branch 'upstream/master' 2015-04-01 10:33:25 -04:00
social Removed admin audit events - need to rethink how to implement it 2015-03-31 14:37:54 +02:00
testsuite Merge remote-tracking branch 'upstream/master' 2015-04-01 10:33:25 -04:00
timer ProviderFactory.postInit() 2015-02-23 12:11:48 -05:00
.gitignore Old experiment with keycloak-server.json embedded into standalone.xml 2014-11-05 08:31:05 -05:00
.travis.yml Update Travis CI config 2015-01-27 13:20:49 +01:00
License.html distro 2014-01-07 14:37:50 -05:00
pom.xml Removed unused bcmail bouncycastle dependency. 2015-03-31 17:07:28 +05:30
README.md KEYCLOAK-28 - Login with LinkedIn 2015-03-23 10:24:01 +01:00

keycloak

Please visit http://keycloak.org for more information on Keycloak including how to download, documentation, and video tutorials.

Keycloak is an SSO Service for web apps and REST services. It can be used for social applications as well as enterprise applications. It is based on OpenID Connect with support for SAML 2.0 as well. Here's some of the features:

  • SSO and Single Log Out for browser applications
  • Social Broker. Enable Google, Facebook, Yahoo, Twitter, GitHub, LinkedIn social login with no code required.
  • Optional LDAP/Active Directory integration
  • Optional User Registration
  • Password and TOTP support (via Google Authenticator or FreeOTP). Client cert auth coming soon.
  • User session management from both admin and user perspective
  • Customizable themes for user facing pages: login, grant pages, account management, emails, and admin console all customizable!
  • OAuth Bearer token auth for REST Services
  • Integrated Browser App to REST Service token propagation
  • Admin REST API
  • OAuth 2.0 Grant requests
  • CORS Support
  • CORS Web Origin management and validation
  • Completely centrally managed user and role mapping metadata. Minimal configuration at the application side
  • Admin Console for managing users, roles, role mappings, applications, user sessions, allowed CORS web origins, and OAuth clients.
  • Deployable as a WAR, appliance, or an Openshift cloud service (SaaS).
  • Supports JBoss AS7, EAP 6.x, Wildfly, Tomcat, and Jetty applications. Plans to support Node.js, RAILS, GRAILS, and other non-Java applications.
  • Javascript/HTML 5 adapter for pure Javascript apps
  • Session management from admin console
  • Revocation policies
  • Password policies
  • OpenID Connect Support
  • SAML Support
  • Token claim and SAML assertion mappings, role name mappings, etc. Ability to configure exactly what information you want in your tokens and SAML documents
  • IDP brokering or chaining. You can set up Keycloak to be a child IDP to another SAML or OIDC IDP.
  • Kerberos bridging. Logged in Kerberos users can access Keycloak SAML or OIDC applications via our Kerberos bridge.

Please visit http://keycloak.org for more information on Keycloak including how to download, documentation, and video tutorials.