No description
Find a file
Thomas Darimont eb2936f655 Add note about using groups with transient-users
Document an additional approach for managing user-roles for transient-users via groups.

Signed-off-by: Thomas Darimont <thomas.darimont@googlemail.com>
2024-04-18 14:49:18 +02:00
.github Upgrade artifact actions to latest version (#28483) 2024-04-15 17:14:00 +02:00
.idea
.mvn
adapters Retry the login in the SAML adapter if response is authentication_expired 2024-04-12 14:55:31 +02:00
authz
boms
common Remove deprecated LinkedIn social provider 2024-04-18 10:10:58 +02:00
core Restrict the token types that can be verified when not using the user info endpoint (#146) (#28866) 2024-04-18 14:11:05 +02:00
crypto Fix OCSP nonce handling 2024-04-18 09:04:46 +02:00
dependencies
distribution
docs Add note about using groups with transient-users 2024-04-18 14:49:18 +02:00
federation
integration fix: replaces aesh with picocli (#28276) 2024-04-15 13:04:58 +00:00
js remove use of deprecated components (#28800) 2024-04-18 12:14:53 +02:00
misc
model Organization member onboarding using the organization identity provider 2024-04-17 07:24:01 -03:00
operator fix: adjusting the test to use a fully valid config 2024-04-12 21:17:52 +02:00
quarkus Persistent sessions code also for offline sessions (#28319) 2024-04-12 13:15:02 +02:00
rest Ensure correct treatment of auth and transient users 2024-04-15 10:17:34 +02:00
saml-core
saml-core-api
server-spi Organization member onboarding using the organization identity provider 2024-04-17 07:24:01 -03:00
server-spi-private Organization member onboarding using the organization identity provider 2024-04-17 07:24:01 -03:00
services Prevent updating IdP via organization API not linked with the organization 2024-04-18 09:14:54 -03:00
testsuite Prevent updating IdP via organization API not linked with the organization 2024-04-18 09:14:54 -03:00
themes Organization member onboarding using the organization identity provider 2024-04-17 07:24:01 -03:00
util
.gitattributes
.gitignore
.gitleaks.toml
ADOPTERS.md
CONTRIBUTING.md
eslint.config.js Explicitly specify React version for ESLint (#28726) 2024-04-15 14:44:06 +02:00
get-version.sh
GOVERNANCE.md
LICENSE.txt
MAINTAINERS.md
maven-settings.xml
mvnw
mvnw.cmd
package.json Upgrade PNPM to version 9 (#28811) 2024-04-16 15:50:39 +00:00
pnpm-lock.yaml Moved masthead to ui-shared (#28871) 2024-04-18 11:16:06 +02:00
pnpm-workspace.yaml
pom.xml Upgrade PNPM to version 9 (#28811) 2024-04-16 15:50:39 +00:00
PR-CHECKLIST.md
README.md
SECURITY-INSIGHTS.yml
set-version.sh
tsconfig.eslint.json Move ESLint configuration to project root (#28639) 2024-04-12 08:34:18 +00:00
tsconfig.json Move ESLint configuration to project root (#28639) 2024-04-12 08:34:18 +00:00

Keycloak

GitHub Release OpenSSF Best Practices GitHub Repo stars GitHub commit activity

Open Source Identity and Access Management

Add authentication to applications and secure services with minimum effort. No need to deal with storing users or authenticating users.

Keycloak provides user federation, strong authentication, user management, fine-grained authorization, and more.

Help and Documentation

Reporting Security Vulnerabilities

If you have found a security vulnerability, please look at the instructions on how to properly report it.

Reporting an issue

If you believe you have discovered a defect in Keycloak, please open an issue. Please remember to provide a good summary, description as well as steps to reproduce the issue.

Getting started

To run Keycloak, download the distribution from our website. Unzip and run:

bin/kc.[sh|bat] start-dev

Alternatively, you can use the Docker image by running:

docker run quay.io/keycloak/keycloak start-dev

For more details refer to the Keycloak Documentation.

Building from Source

To build from source, refer to the building and working with the code base guide.

Testing

To run tests, refer to the running tests guide.

Writing Tests

To write tests, refer to the writing tests guide.

Contributing

Before contributing to Keycloak, please read our contributing guidelines. Participation in the Keycloak project is governed by the CNCF Code of Conduct.

Other Keycloak Projects

License