Gestion d'identité et SSO
Find a file
Alexander Schwartz f4f452693f
Fixing product name convention in the docs
Closes #47993

Signed-off-by: Alexander Schwartz <alexander.schwartz@ibm.com>
2026-04-13 13:03:48 -04:00
.github Bump azure/login from 2.3.0 to 3.0.0 (#47973) 2026-04-13 18:51:36 +02:00
.idea Add Intellij project icon 2023-09-18 12:39:16 +02:00
.mvn Handle special characters in mvnw.cmd Windows paths 2026-04-07 18:24:21 +02:00
adapters Ensure that an encrypted assertion is signed if response is not signed (#355) (#46929) 2026-03-09 10:25:27 +01:00
authz Also deploy keycloak-authz-client-tests when deploy-testsuite profile is active 2026-04-08 17:17:13 +02:00
boms Add Spotless plugin with removeUnusedImports check enabled 2025-10-13 13:32:01 +02:00
common [OID4VCI-HAIP] Pass oid4vci-1_0-issuer-metadata_test 2026-04-10 13:54:43 +02:00
core [OID4VCI-HAIP] Pass oid4vci-1_0-issuer-metadata_test 2026-04-10 13:54:43 +02:00
crypto Support Java 25 with FIPS enabled (#47581) 2026-04-01 09:57:25 +02:00
dependencies Add missing artifact descriptions to allow Maven Central Portal Publisher pass validation process. (#40822) 2025-08-12 16:50:17 +02:00
distribution fix release night doc build (#47721) 2026-04-02 15:59:36 +00:00
docs Fixing product name convention in the docs 2026-04-13 13:03:48 -04:00
federation Fix NPE when synchronizing LDAP user attributes 2026-04-06 10:58:27 -03:00
integration Not possible to sync latest keycloak-admin-client to keycloak-client (#47950) 2026-04-13 18:31:25 +02:00
js refactor(admin-ui): replace use-react-router-breadcrumbs with React Router native useMatches 2026-04-13 13:11:28 +02:00
misc Update tests in common to use JUnit 6 2026-04-09 21:52:47 +02:00
model fix: Duplicate entries created in Role Attributes during concurrent setSingleAttribute calls 2026-04-08 11:06:47 -03:00
operator fix: remove extra dependencies from the operator (#47912) 2026-04-09 17:09:47 +00:00
quarkus fix: introduces the concept of a synthetic option (#47399) 2026-04-10 21:03:21 -04:00
rest New client service - PUT/POST - update or create client (#47029) 2026-04-13 18:33:01 +02:00
saml-core Ensure that an encrypted assertion is signed if response is not signed (#355) (#46929) 2026-03-09 10:25:27 +01:00
saml-core-api Use MIME decoder instead of the default one to replace deprecated Base64 class 2026-01-09 16:38:09 +01:00
scim Support for managing members via group resource type 2026-04-02 20:06:12 +02:00
server-spi Adding namespaces for single-use cache entries for PAR and OAuth code (#471) (#47798) 2026-04-07 11:13:35 +02:00
server-spi-private Add account-console to defaultClients to prevent deletion of built-in client 2026-04-13 14:01:13 +02:00
services New client service - PUT/POST - update or create client (#47029) 2026-04-13 18:33:01 +02:00
test-framework Fix Cluster Compatibility Tests for 26.6 2026-04-08 20:57:17 +02:00
tests Rename 'Pre-Authorized Code Lifespan' to 'Credential Offer Lifespan' (#47563) 2026-04-10 17:10:14 +02:00
testsuite Continue with next step when IdP returns an error 2026-04-13 17:40:11 +02:00
themes Add Vietnamese (vi) locale support with initial translations 2026-04-13 09:16:14 +02:00
util Implement forced password change for LDAP federated user (password policy control) (#15253) 2026-02-20 09:15:51 -03:00
.editorconfig Proposed import order (#43432) 2025-11-14 09:34:49 +01:00
.gitattributes enforce LF line endings on *.tsx files (#45997) 2026-02-18 10:28:55 +00:00
.gitignore [OID4VCI] Credential Offer must be created by Issuer not Holder (#44255) 2025-11-27 16:07:10 +01:00
.gitleaks.toml Updated .gitleaks.toml to ignore false positive in RedirectUtilsTest (#33346) 2024-09-27 14:32:36 +02:00
ADOPTERS.md Add Xata to ADOPTERS.md (#40802) 2025-06-30 19:32:32 +02:00
CONTRIBUTING.md Update contributors guidelines (#46904) 2026-03-09 09:03:31 +01:00
get-version.sh Make shebang in bash scripts consistent (#37369) 2026-02-17 11:32:28 +01:00
GOVERNANCE.md Update governance model around changes in maintainership (#29292) 2024-05-22 08:24:10 +02:00
LICENSE.txt
MAINTAINERS.md Add Steven Hawkins as a maintainer (#45144) 2026-01-05 16:32:14 +01:00
maven-settings.xml [KEYCLOAK-11764] Upgrade to Wildfly 19 2020-04-24 08:19:43 -03:00
mvnw Handle special characters in mvnw.cmd Windows paths 2026-04-07 18:24:21 +02:00
mvnw.cmd Handle special characters in mvnw.cmd Windows paths 2026-04-07 18:24:21 +02:00
pom.xml CloudNativePG 1.29 2026-04-08 16:24:18 +02:00
PR-CHECKLIST.md Introduce CODEOWNERS (#16637) 2023-01-30 13:05:45 +01:00
README.md Add CoC to README (#47964) 2026-04-10 23:34:47 +02:00
SECURITY-INSIGHTS.yml Provide an OpenSSF security insights manifest file 2024-02-15 11:02:33 -03:00
set-version.sh Make shebang in bash scripts consistent (#37369) 2026-02-17 11:32:28 +01:00

Keycloak

GitHub Release OpenSSF Best Practices CLOMonitor OpenSSF Scorecard Artifact Hub GitHub Repo stars GitHub commit activity Translation status

Open Source Identity and Access Management

Add authentication to applications and secure services with minimum effort. No need to deal with storing users or authenticating users.

Keycloak provides user federation, strong authentication, user management, fine-grained authorization, and more.

Help and Documentation

Reporting Security Vulnerabilities

If you have found a security vulnerability, please look at the instructions on how to properly report it.

Reporting an issue

If you believe you have discovered a defect in Keycloak, please open an issue. Please remember to provide a good summary, description as well as steps to reproduce the issue.

Getting started

To run Keycloak, download the distribution from our website. Unzip and run:

bin/kc.[sh|bat] start-dev

Alternatively, you can use the Docker image by running:

docker run quay.io/keycloak/keycloak start-dev

For more details refer to the Keycloak Documentation.

Building from Source

To build from source, refer to the building and working with the code base guide.

Testing

To run tests, refer to the running tests guide.

Writing Tests

To write tests, refer to the writing tests guide.

Contributing

Before contributing to Keycloak, please read our contributing guidelines. Participation in the Keycloak project is governed by the CNCF Code of Conduct.

Joining a community meeting is a great way to get involved and help shape the future of Keycloak.

Code of Conduct

We are committed to providing a safe, welcoming, and constructive environment for all Keycloak contributors and users. To protect this space, we actively enforce our Code of Conduct. If you wish to report an incident or appeal a moderation decision, please email keycloak-coc@googlegroups.com.

Other Keycloak Projects

License