No description
Find a file
gbtec-igormartens c41bcddd8d Update UserResource.java
In my opinion, the old documentation does not match the actual behaviour of the resetPassword method.
2018-10-04 12:54:49 +02:00
.travis Update triggers for Docker Hub 2018-08-20 20:38:57 +02:00
adapters [KEYCLOAK-6928] - Selecting first bearer if multiple values exists in authorization header 2018-10-01 09:36:10 -03:00
authz Set version to 4.6.0.Final-SNAPSHOT 2018-09-26 20:58:41 +02:00
boms Set version to 4.6.0.Final-SNAPSHOT 2018-09-26 20:58:41 +02:00
common [KEYCLOAK-7950] - Fixes user pagination when using filtering users members of groups 2018-10-02 15:44:23 -03:00
core KEYCLOAK-6884 KEYCLOAK-3454 KEYCLOAK-8298 Default 'roles' and 'web-origins' client scopes. Add roles and allowed-origins to the token through protocol mappers 2018-10-04 12:00:38 +02:00
dependencies Set version to 4.6.0.Final-SNAPSHOT 2018-09-26 20:58:41 +02:00
distribution Set version to 4.6.0.Final-SNAPSHOT 2018-09-26 20:58:41 +02:00
examples Set version to 4.6.0.Final-SNAPSHOT 2018-09-26 20:58:41 +02:00
federation Set version to 4.6.0.Final-SNAPSHOT 2018-09-26 20:58:41 +02:00
integration Set version to 4.6.0.Final-SNAPSHOT 2018-09-26 20:58:41 +02:00
misc KEYCLOAK-6807 Refactor TestHelper 2018-10-01 09:39:42 -03:00
model [KEYCLOAK-7950] - Fixes user pagination when using filtering users members of groups 2018-10-02 15:44:23 -03:00
proxy Set version to 4.6.0.Final-SNAPSHOT 2018-09-26 20:58:41 +02:00
saml-core KEYCLOAK-7740 Support parsing of xs:date type 2018-10-02 19:54:40 +02:00
saml-core-api Set version to 4.6.0.Final-SNAPSHOT 2018-09-26 20:58:41 +02:00
server-spi KEYCLOAK-6884 KEYCLOAK-3454 KEYCLOAK-8298 Default 'roles' and 'web-origins' client scopes. Add roles and allowed-origins to the token through protocol mappers 2018-10-04 12:00:38 +02:00
server-spi-private KEYCLOAK-6884 KEYCLOAK-3454 KEYCLOAK-8298 Default 'roles' and 'web-origins' client scopes. Add roles and allowed-origins to the token through protocol mappers 2018-10-04 12:00:38 +02:00
services Update UserResource.java 2018-10-04 12:54:49 +02:00
testsuite KEYCLOAK-6884 KEYCLOAK-3454 KEYCLOAK-8298 Default 'roles' and 'web-origins' client scopes. Add roles and allowed-origins to the token through protocol mappers 2018-10-04 12:00:38 +02:00
themes KEYCLOAK-6884 KEYCLOAK-3454 KEYCLOAK-8298 Default 'roles' and 'web-origins' client scopes. Add roles and allowed-origins to the token through protocol mappers 2018-10-04 12:00:38 +02:00
util Set version to 4.6.0.Final-SNAPSHOT 2018-09-26 20:58:41 +02:00
wildfly Set version to 4.6.0.Final-SNAPSHOT 2018-09-26 20:58:41 +02:00
.gitattributes KEYCLOAK-1385 Introduce end-of-line normalization 2015-07-17 13:46:51 +02:00
.gitignore ignoring bin/ directories instead of bin files 2018-08-22 16:39:55 +02:00
.travis.yml KEYCLOAK-5226 Test with trusty image 2018-08-24 13:21:51 +02:00
License.html distro 2014-01-07 14:37:50 -05:00
pom.xml Set version to 4.6.0.Final-SNAPSHOT 2018-09-26 20:58:41 +02:00
prod-arguments.json KEYCLOAK-8378 Drop dependencyOverride for infinispan-core in prod-arguments.json 2018-09-24 09:35:20 +02:00
README.md Add documentation and logging for the default admin account in test suite 2018-09-21 14:36:42 +02:00
set-version.sh Bump versions 2017-11-09 15:37:21 +01:00
travis-run-tests.sh KEYCLOAK-7635 : Authenticate clients with x509 certificate 2018-08-13 09:36:02 +02:00

Keycloak

Open Source Identity and Access Management for modern Applications and Services.

For more information about Keycloak visit Keycloak homepage and Keycloak blog.

Building

Ensure you have JDK 8 (or newer), Maven 3.1.1 (or newer) and Git installed

java -version
mvn -version
git --version

First clone the Keycloak repository:

git clone https://github.com/keycloak/keycloak.git
cd keycloak

To build Keycloak run:

mvn install

This will build all modules and run the testsuite.

To build the distribution run:

mvn install -Pdistribution

Once completed you will find distribution archives in distribution.

To build only the server run:

mvn -Pdistribution -pl distribution/server-dist -am -Dmaven.test.skip clean install

Starting Keycloak

To start Keycloak during development first build as specified above, then run:

mvn -f testsuite/utils/pom.xml exec:java -Pkeycloak-server 

When running testsuite, by default an account with username admin and password admin will be created within the master realm at start.

To start Keycloak from the server distribution first build the distribution it as specified above, then run:

tar xfz distribution/server-dist/target/keycloak-<VERSION>.tar.gz
cd keycloak-<VERSION>
bin/standalone.sh

To stop the server press Ctrl + C.

Reporting security vulnerabilities

If you've found a security vulnerability, please look at the instructions on how to properly report it

Help and Documentation

  • Documentation - User Guide, Admin REST API and Javadocs
  • User Mailing List - Mailing list to ask for help and general questions about Keycloak
  • JIRA - Issue tracker for bugs and feature requests

Contributing

License