No description
Find a file
Marek Posolda b2c0b90d07 Merge pull request #958 from mposolda/master
Kerberos broker - step 1
2015-02-10 09:53:35 +01:00
broker KEYCLOAK-828 SPNEGO/Kerberos broker - step 1 2015-02-10 09:50:07 +01:00
connections [KEYCLOAK-992] - Token retrieval from brokered idps. 2015-02-06 22:23:34 -02:00
core [KEYCLOAK-883] - Refactoring to services endpoints and exposing them through admin client. 2015-02-09 21:30:21 -02:00
core-jaxrs
dependencies KEYCLOAK-828 SPNEGO/Kerberos broker - step 1 2015-02-10 09:50:07 +01:00
distribution KEYCLOAK-1023 Improve osgi packaging for hawtio. Fix typos in fuse example docs. 2015-02-02 23:25:56 +01:00
docbook frontchannel docs 2015-02-06 09:28:00 -05:00
events Changed syslog event listener id 2015-02-04 09:02:48 +01:00
examples [KEYCLOAK-883] - Twitter example. 2015-02-09 21:34:10 -02:00
export-import
federation
forms KEYCLOAK-828 SPNEGO/Kerberos broker - step 1 2015-02-10 09:50:07 +01:00
integration [KEYCLOAK-883] - Refactoring to services endpoints and exposing them through admin client. 2015-02-09 21:30:21 -02:00
misc Update Travis CI config 2015-01-27 13:20:49 +01:00
model Mongo fix 2015-02-10 09:50:07 +01:00
picketlink
project-integrations KEYCLOAK-955 Fix AeroGear project integration example 2015-01-14 14:32:03 +01:00
proxy KEYCLOAK-1020, minimal change 2015-01-31 17:29:36 +01:00
saml saml frontchannel logout 2015-01-28 17:09:13 -05:00
server KEYCLOAK-999 Load providers from file-system 2015-01-28 09:15:07 +01:00
services Ensure timestamp on clientSession is updated in AccountService when linking identity broker 2015-02-10 09:49:44 +01:00
social [KEYCLOAK-992] - Storing twitter tokens. 2015-02-09 21:31:16 -02:00
testsuite [KEYCLOAK-883] - Refactoring to services endpoints and exposing them through admin client. 2015-02-09 21:30:21 -02:00
timer
.gitignore
.travis.yml Update Travis CI config 2015-01-27 13:20:49 +01:00
License.html
pom.xml Changed syslog event listener id 2015-02-04 09:02:48 +01:00
README.md

keycloak

Please visit http://keycloak.org for more information on Keycloak including how to download, documentation, and video tutorials.

Keycloak is an SSO Service for web apps and REST services. It can be used for social applications as well as enterprise applications. It is based on OpenID Connect with support for SAML 2.0 as well. Here's some of the features:

  • SSO and Single Log Out for browser applications
  • Social Broker. Enable Google, Facebook, Yahoo, Twitter social login with no code required.
  • Optional LDAP/Active Directory integration
  • Optional User Registration
  • Password and TOTP support (via Google Authenticator or FreeOTP). Client cert auth coming soon.
  • User session management from both admin and user perspective
  • Customizable themes for user facing pages: login, grant pages, account management, emails, and admin console all customizable!
  • OAuth Bearer token auth for REST Services
  • Integrated Browser App to REST Service token propagation
  • Admin REST API
  • OAuth 2.0 Grant requests
  • CORS Support
  • CORS Web Origin management and validation
  • Completely centrally managed user and role mapping metadata. Minimal configuration at the application side
  • Admin Console for managing users, roles, role mappings, applications, user sessions, allowed CORS web origins, and OAuth clients.
  • Deployable as a WAR, appliance, or an Openshift cloud service (SaaS).
  • Supports JBoss AS7, EAP 6.x, Wildfly, Tomcat, and Jetty applications. Plans to support Node.js, RAILS, GRAILS, and other non-Java applications.
  • Javascript/HTML 5 adapter for pure Javascript apps
  • Session management from admin console
  • Revocation policies
  • Password policies
  • OpenID Connect Support
  • SAML Support

Please visit http://keycloak.org for more information on Keycloak including how to download, documentation, and video tutorials.