keycloak-scim/examples/providers/federation-provider
mposolda d8024b0c6c Kerberos refactored to be federation provider. Support for Kerberos and LDAP. Username/password authentication support with kerberos credentials.
First step - KerberosFederationProvider

Finished KerberosFederationProvider. Added support for username/password authentication with kerberos credentials

Added Kerberos UI to LDAPFederationProvider

Fixes
2015-02-18 17:19:15 +01:00
..
src/main Kerberos refactored to be federation provider. Support for Kerberos and LDAP. Username/password authentication support with kerberos credentials. 2015-02-18 17:19:15 +01:00
pom.xml Version bump 2015-01-12 10:35:50 +01:00
README.md Added provider section to docs 2015-01-28 11:25:27 +01:00

Example User Federation Provider

This is an example of user federation backed by a simple properties file. This properties file only contains username/password key pairs. To deploy, build this directory then take the jar and copy it to standalone/configuration/providers.
You will then have to restart the authentication server.

The ClasspathPropertiesFederationProvider is an example of a readonly provider. If you go to the Users/Federation page of the admin console you will see this provider listed under "classpath-properties. To configure this provider you specify a classpath to a properties file in the "path" field of the admin page for this plugin. This example includes a "test-users.properties" within the JAR that you can use as the variable.

The FilePropertiesFederationProvider is an example of a writable provider. It synchronizes changes made to username and password with the properties file. If you go to the Users/Federation page of the admin console you will see this provider listed under "file-properties". To configure this provider you specify a fully qualified file path to a properties file in the "path" field of the admin page for this plugin.