keycloak-scim/docs/guides/securing-apps/partials/overview/getting-started.adoc
rmartinc 942d5d0aa3 Convert chapter planning for securing applications and services to guides
Final removal of the securing_apps documentation
Final checks for links, order and other minor things
Closes #31328

Signed-off-by: rmartinc <rmartinc@redhat.com>
2024-08-01 16:45:56 +02:00

52 lines
1.5 KiB
Text

== Getting Started
The link:{quickstartRepo_link}[{quickstartRepo_name}] provides examples about how to secure applications and services
using different programming languages and frameworks. By going through their documentation and codebase, you will
understand the bare minimum changes required in your application and service in order to secure it with {project_name}.
Also, see the following sections for recommendations for trusted and well-known client-side implementations for both OpenID
Connect and SAML protocols.
=== OpenID Connect
ifeval::[{project_community}==true]
==== Java
* {quickstartRepo_link}/tree/latest/jakarta/servlet-authz-client[Wildfly Elytron OIDC]
* {quickstartRepo_link}/tree/latest/spring/rest-authz-resource-server[Spring Boot]
endif::[]
==== JavaScript (client-side)
* <@links.securingapps id="javascript-adapter"/>
==== Node.js (server-side)
* <@links.securingapps id="nodejs-adapter"/>
ifeval::[{project_community}==true]
==== C#
* https://github.com/dylanplecki/KeycloakOwinAuthentication[OWIN]
==== Python
* https://pypi.org/project/oic/[oidc]
==== Android
* https://github.com/openid/AppAuth-Android[AppAuth]
==== iOS
* https://github.com/openid/AppAuth-iOS[AppAuth]
==== Apache HTTP Server
* https://github.com/OpenIDC/mod_auth_openidc[mod_auth_openidc]
endif::[]
=== SAML
==== Java
* <@links.securingapps id="saml-galleon-layers"/>
ifeval::[{project_community}==true]
==== Apache HTTP Server
* <@links.securingapps id="mod-auth-mellon"/>
endif::[]