Gestion d'identité et SSO
Find a file
2026-04-15 15:10:27 -04:00
.github Build Quarkus from source in quarkus-next workflow (#47892) 2026-04-15 17:05:10 +02:00
.idea Add Intellij project icon 2023-09-18 12:39:16 +02:00
.mvn Handle special characters in mvnw.cmd Windows paths 2026-04-07 18:24:21 +02:00
adapters Ensure that an encrypted assertion is signed if response is not signed (#355) (#46929) 2026-03-09 10:25:27 +01:00
authz Also deploy keycloak-authz-client-tests when deploy-testsuite profile is active 2026-04-08 17:17:13 +02:00
boms Add Spotless plugin with removeUnusedImports check enabled 2025-10-13 13:32:01 +02:00
common [OID4VCI-HAIP] Pass oid4vci-1_0-issuer-metadata_test 2026-04-10 13:54:43 +02:00
core [OID4VCI-HAIP] Pass oid4vci-1_0-issuer-metadata_test 2026-04-10 13:54:43 +02:00
crypto Support Java 25 with FIPS enabled (#47581) 2026-04-01 09:57:25 +02:00
dependencies Add missing artifact descriptions to allow Maven Central Portal Publisher pass validation process. (#40822) 2025-08-12 16:50:17 +02:00
distribution fix release night doc build (#47721) 2026-04-02 15:59:36 +00:00
docs Update Openshift version referenced in the HA guide from 4.18 to 4.21 2026-04-15 15:26:24 +02:00
federation Fix NPE when synchronizing LDAP user attributes 2026-04-06 10:58:27 -03:00
integration feat(admin-api-v2): make CLI discriminator subcommand optional (#48018) 2026-04-15 15:10:27 -04:00
js fix: using inputstream to represent patches (#47953) 2026-04-15 16:20:59 +02:00
misc Update tests in common to use JUnit 6 2026-04-09 21:52:47 +02:00
model Use the correct resource in ClientResourceTypeWorkflowProvider#resolveResource 2026-04-15 16:34:53 +02:00
operator fix: remove extra dependencies from the operator (#47912) 2026-04-09 17:09:47 +00:00
quarkus Fix typo: boostrap to bootstrap in documentation files and strings (#48034) 2026-04-14 18:14:14 +02:00
rest feat(admin-api-v2): make CLI discriminator subcommand optional (#48018) 2026-04-15 15:10:27 -04:00
saml-core Ensure that an encrypted assertion is signed if response is not signed (#355) (#46929) 2026-03-09 10:25:27 +01:00
saml-core-api Use MIME decoder instead of the default one to replace deprecated Base64 class 2026-01-09 16:38:09 +01:00
scim Support for managing members via group resource type 2026-04-02 20:06:12 +02:00
server-spi Allow organization IdPs for members linked to another broker 2026-04-15 08:57:38 -03:00
server-spi-private Handle resource IDs matching the resource type for "Enforce access to" -> "All" 2026-04-15 09:56:49 -03:00
services when the realm session limit is exceeded and behavior is set to Termi… (#48064) 2026-04-15 15:56:46 +02:00
test-framework Pass and use rememberMe option in passkeys authenticators 2026-04-15 10:28:56 -03:00
tests Use the correct resource in ClientResourceTypeWorkflowProvider#resolveResource 2026-04-15 16:34:53 +02:00
testsuite when the realm session limit is exceeded and behavior is set to Termi… (#48064) 2026-04-15 15:56:46 +02:00
themes Pass and use rememberMe option in passkeys authenticators 2026-04-15 10:28:56 -03:00
util Implement forced password change for LDAP federated user (password policy control) (#15253) 2026-02-20 09:15:51 -03:00
.editorconfig Proposed import order (#43432) 2025-11-14 09:34:49 +01:00
.gitattributes enforce LF line endings on *.tsx files (#45997) 2026-02-18 10:28:55 +00:00
.gitignore [OID4VCI] Credential Offer must be created by Issuer not Holder (#44255) 2025-11-27 16:07:10 +01:00
.gitleaks.toml Updated .gitleaks.toml to ignore false positive in RedirectUtilsTest (#33346) 2024-09-27 14:32:36 +02:00
ADOPTERS.md Add Xata to ADOPTERS.md (#40802) 2025-06-30 19:32:32 +02:00
CONTRIBUTING.md Update contributors guidelines (#46904) 2026-03-09 09:03:31 +01:00
get-version.sh Make shebang in bash scripts consistent (#37369) 2026-02-17 11:32:28 +01:00
GOVERNANCE.md Update governance model around changes in maintainership (#29292) 2024-05-22 08:24:10 +02:00
LICENSE.txt Added text version of ASL2 license 2019-11-08 12:43:10 +01:00
MAINTAINERS.md Add Steven Hawkins as a maintainer (#45144) 2026-01-05 16:32:14 +01:00
maven-settings.xml [KEYCLOAK-11764] Upgrade to Wildfly 19 2020-04-24 08:19:43 -03:00
mvnw Handle special characters in mvnw.cmd Windows paths 2026-04-07 18:24:21 +02:00
mvnw.cmd Handle special characters in mvnw.cmd Windows paths 2026-04-07 18:24:21 +02:00
pom.xml CloudNativePG 1.29 2026-04-08 16:24:18 +02:00
PR-CHECKLIST.md Introduce CODEOWNERS (#16637) 2023-01-30 13:05:45 +01:00
README.md Add CoC to README (#47964) 2026-04-10 23:34:47 +02:00
SECURITY-INSIGHTS.yml Provide an OpenSSF security insights manifest file 2024-02-15 11:02:33 -03:00
set-version.sh Make shebang in bash scripts consistent (#37369) 2026-02-17 11:32:28 +01:00

Keycloak

GitHub Release OpenSSF Best Practices CLOMonitor OpenSSF Scorecard Artifact Hub GitHub Repo stars GitHub commit activity Translation status

Open Source Identity and Access Management

Add authentication to applications and secure services with minimum effort. No need to deal with storing users or authenticating users.

Keycloak provides user federation, strong authentication, user management, fine-grained authorization, and more.

Help and Documentation

Reporting Security Vulnerabilities

If you have found a security vulnerability, please look at the instructions on how to properly report it.

Reporting an issue

If you believe you have discovered a defect in Keycloak, please open an issue. Please remember to provide a good summary, description as well as steps to reproduce the issue.

Getting started

To run Keycloak, download the distribution from our website. Unzip and run:

bin/kc.[sh|bat] start-dev

Alternatively, you can use the Docker image by running:

docker run quay.io/keycloak/keycloak start-dev

For more details refer to the Keycloak Documentation.

Building from Source

To build from source, refer to the building and working with the code base guide.

Testing

To run tests, refer to the running tests guide.

Writing Tests

To write tests, refer to the writing tests guide.

Contributing

Before contributing to Keycloak, please read our contributing guidelines. Participation in the Keycloak project is governed by the CNCF Code of Conduct.

Joining a community meeting is a great way to get involved and help shape the future of Keycloak.

Code of Conduct

We are committed to providing a safe, welcoming, and constructive environment for all Keycloak contributors and users. To protect this space, we actively enforce our Code of Conduct. If you wish to report an incident or appeal a moderation decision, please email keycloak-coc@googlegroups.com.

Other Keycloak Projects

License