No description
Find a file
2014-10-01 10:51:24 +02:00
connections Clustering support 2014-09-30 09:40:20 +02:00
core Cleanup. Support to use-hostname-for-local-requests added to Demo examples 2014-09-30 17:37:36 +02:00
core-jaxrs Change version schema to match JBoss 2014-09-12 09:35:08 +02:00
dependencies Clustering support 2014-09-30 09:40:20 +02:00
distribution Change version schema to match JBoss 2014-09-12 09:35:08 +02:00
docbook fix docbook link 2014-09-24 12:58:18 +03:00
events ClientSession everywhere refactor phase1 2014-09-26 17:44:33 -04:00
examples Cleanup. Support to use-hostname-for-local-requests added to Demo examples 2014-09-30 17:37:36 +02:00
export-import Change version schema to match JBoss 2014-09-12 09:35:08 +02:00
federation Change version schema to match JBoss 2014-09-12 09:35:08 +02:00
forms login refactor phase 2, still more to do 2014-09-29 16:15:33 -04:00
integration Cleanup. Support to use-hostname-for-local-requests added to Demo examples 2014-09-30 17:37:36 +02:00
misc/logo Updated FavIcon and Keycloak Logos 2014-03-07 18:51:10 -03:00
model Fixes to JPA user session provider 2014-09-30 14:47:22 +02:00
picketlink Change version schema to match JBoss 2014-09-12 09:35:08 +02:00
project-integrations Change version schema to match JBoss 2014-09-12 09:35:08 +02:00
server Use infinispan UserSession provider for docker cluster env. Don't prepare nodes during each fig start 2014-10-01 10:51:24 +02:00
services Fixes to Mongo user session provider 2014-09-30 14:24:49 +02:00
social ClientSession everywhere refactor phase1 2014-09-26 17:44:33 -04:00
testsuite Use infinispan UserSession provider for docker cluster env. Don't prepare nodes during each fig start 2014-10-01 10:51:24 +02:00
timer Change version schema to match JBoss 2014-09-12 09:35:08 +02:00
.gitignore Added eclipse files to .gitignore 2013-07-22 15:18:06 +01:00
License.html distro 2014-01-07 14:37:50 -05:00
pom.xml Clustering support 2014-09-30 09:40:20 +02:00
README.md readme again 2014-08-20 08:50:24 -04:00

keycloak

Please visit http://keycloak.org for more information on Keycloak including how to download, documentation, and video tutorials.

Keycloak is an SSO Service for web apps and REST services. It can be used for social applications as well as enterprise applications. It is based on OpenID Connect with SAML support in the works. Here's some of the features:

  • SSO and Single Log Out for browser applications
  • Social Broker. Enable Google, Facebook, Yahoo, Twitter social login with no code required.
  • Optional LDAP/Active Directory integration
  • Optional User Registration
  • Password and TOTP support (via Google Authenticator). Client cert auth coming soon.
  • User session management from both admin and user perspective
  • Customizable themes for user facing pages: login, grant pages, account management, emails, and admin console all customizable!
  • OAuth Bearer token auth for REST Services
  • Integrated Browser App to REST Service token propagation
  • Admin REST API
  • OAuth 2.0 Grant requests
  • CORS Support
  • CORS Web Origin management and validation
  • Completely centrally managed user and role mapping metadata. Minimal configuration at the application side
  • Admin Console for managing users, roles, role mappings, applications, user sessions, allowed CORS web origins, and OAuth clients.
  • Deployable as a WAR, appliance, or an Openshift cloud service (SaaS).
  • Supports JBoss AS7, EAP 6.x, and Wildfly applications. Plans to support Node.js, RAILS, GRAILS, and other non-Java applications.
  • Javascript/HTML 5 adapter for pure Javascript apps
  • Session management from admin console
  • Revocation policies
  • Password policies
  • OpenID Connect Support

Please visit http://keycloak.org for more information on Keycloak including how to download, documentation, and video tutorials.