Gestion d'identité et SSO
Find a file
Lukas Hanusovsky 768cea1b82
Add FIPS suite to the new tests (#43431)
* Add FIPS test suite to the new tests

Signed-off-by: Lukas Hanusovsky <lhanusov@redhat.com>

* Tweaks to FIPS suite in new test

Signed-off-by: stianst <stianst@gmail.com>

---------

Signed-off-by: Lukas Hanusovsky <lhanusov@redhat.com>
Signed-off-by: stianst <stianst@gmail.com>
Co-authored-by: stianst <stianst@gmail.com>
2025-11-06 14:08:19 +01:00
.github Add FIPS suite to the new tests (#43431) 2025-11-06 14:08:19 +01:00
.idea Add Intellij project icon 2023-09-18 12:39:16 +02:00
.mvn Update custom Maven build cache configuration for js directory 2024-12-10 10:07:02 +00:00
adapters Deprecate org.keycloak.common.util.Base64 2025-10-30 09:12:14 +01:00
authz Remove unused imports as part of #43233 2025-10-13 13:32:01 +02:00
boms Add Spotless plugin with removeUnusedImports check enabled 2025-10-13 13:32:01 +02:00
common Initial Client API v2 impl (#43395) 2025-11-03 14:31:54 +01:00
core Allow identity provider configuration without defaults for user authentication (#43963) 2025-11-05 10:13:40 -03:00
crypto Deprecate org.keycloak.common.util.Base64 2025-10-30 09:12:14 +01:00
dependencies Add missing artifact descriptions to allow Maven Central Portal Publisher pass validation process. (#40822) 2025-08-12 16:50:17 +02:00
distribution Fix javadocs missing antlr dependency (#43055) 2025-09-30 09:29:49 +02:00
docs Allow identity provider configuration without defaults for user authentication (#43963) 2025-11-05 10:13:40 -03:00
federation Deprecate org.keycloak.common.util.Base64 2025-10-30 09:12:14 +01:00
integration Support for YAML payloads for Admin client for creation of workflows 2025-11-03 13:09:17 -03:00
js Filter idps by JWT_AUTHORIZATION_GRANT type in client conifig 2025-11-05 13:56:31 +01:00
misc The fix will separate the option description from the link in the Referrer Policy settings 2025-10-10 15:45:50 -04:00
model Allow identity provider configuration without defaults for user authentication (#43963) 2025-11-05 10:13:40 -03:00
operator add labels to realm import jobs (#42967) 2025-10-31 17:20:22 +01:00
quarkus Add FIPS suite to the new tests (#43431) 2025-11-06 14:08:19 +01:00
rest Initial Client API v2 impl (#43395) 2025-11-03 14:31:54 +01:00
saml-core Deprecate org.keycloak.common.util.Base64 2025-10-30 09:12:14 +01:00
saml-core-api Deprecate org.keycloak.common.util.Base64 2025-10-30 09:12:14 +01:00
server-spi Allow identity provider configuration without defaults for user authentication (#43963) 2025-11-05 10:13:40 -03:00
server-spi-private Audience validation according to latest specs proposal 2025-11-06 10:21:35 +01:00
services Audience validation according to latest specs proposal 2025-11-06 10:21:35 +01:00
test-framework Add FIPS suite to the new tests (#43431) 2025-11-06 14:08:19 +01:00
tests Add FIPS suite to the new tests (#43431) 2025-11-06 14:08:19 +01:00
testsuite Add FIPS suite to the new tests (#43431) 2025-11-06 14:08:19 +01:00
themes Translations update from Hosted Weblate (#43822) 2025-11-05 11:36:41 +01:00
util Remove commons-lang v2 2025-08-14 09:56:02 -03:00
.editorconfig Disable trim_trailing_whitespace in editorconfig 2024-11-07 17:48:17 +01:00
.gitattributes Use lf as line-ending for sh files 2022-07-19 08:57:57 +02:00
.gitignore Git ignore local keycloak state dir 2025-11-03 09:09:22 +00:00
.gitleaks.toml Updated .gitleaks.toml to ignore false positive in RedirectUtilsTest (#33346) 2024-09-27 14:32:36 +02:00
ADOPTERS.md Add Xata to ADOPTERS.md (#40802) 2025-06-30 19:32:32 +02:00
CONTRIBUTING.md Add Spotless plugin with removeUnusedImports check enabled 2025-10-13 13:32:01 +02:00
get-version.sh Use Maven wrapper instead of platform dependent Maven version (#29988) 2024-06-03 15:45:39 +02:00
GOVERNANCE.md Update governance model around changes in maintainership (#29292) 2024-05-22 08:24:10 +02:00
LICENSE.txt Added text version of ASL2 license 2019-11-08 12:43:10 +01:00
MAINTAINERS.md Update maintainers (#43917) 2025-11-05 13:20:40 +01:00
maven-settings.xml [KEYCLOAK-11764] Upgrade to Wildfly 19 2020-04-24 08:19:43 -03:00
mvnw Upgrade Maven and wrapper to latest version 2024-06-19 10:42:33 +02:00
mvnw.cmd Upgrade Maven and wrapper to latest version 2024-06-19 10:42:33 +02:00
pom.xml Initial Client API v2 impl (#43395) 2025-11-03 14:31:54 +01:00
PR-CHECKLIST.md Introduce CODEOWNERS (#16637) 2023-01-30 13:05:45 +01:00
README.md Add CLOMonitor Badge to the README 2025-02-20 12:31:58 -03:00
SECURITY-INSIGHTS.yml Provide an OpenSSF security insights manifest file 2024-02-15 11:02:33 -03:00
set-version.sh Remove Keycloak JS from repository (#37057) 2025-02-12 16:31:21 +00:00

Keycloak

GitHub Release OpenSSF Best Practices CLOMonitor OpenSSF Scorecard Artifact Hub GitHub Repo stars GitHub commit activity Translation status

Open Source Identity and Access Management

Add authentication to applications and secure services with minimum effort. No need to deal with storing users or authenticating users.

Keycloak provides user federation, strong authentication, user management, fine-grained authorization, and more.

Help and Documentation

Reporting Security Vulnerabilities

If you have found a security vulnerability, please look at the instructions on how to properly report it.

Reporting an issue

If you believe you have discovered a defect in Keycloak, please open an issue. Please remember to provide a good summary, description as well as steps to reproduce the issue.

Getting started

To run Keycloak, download the distribution from our website. Unzip and run:

bin/kc.[sh|bat] start-dev

Alternatively, you can use the Docker image by running:

docker run quay.io/keycloak/keycloak start-dev

For more details refer to the Keycloak Documentation.

Building from Source

To build from source, refer to the building and working with the code base guide.

Testing

To run tests, refer to the running tests guide.

Writing Tests

To write tests, refer to the writing tests guide.

Contributing

Before contributing to Keycloak, please read our contributing guidelines. Participation in the Keycloak project is governed by the CNCF Code of Conduct.

Joining a community meeting is a great way to get involved and help shape the future of Keycloak.

Other Keycloak Projects

License