Software:Keycloak
Developer(s) | WildFly, a division of Red Hat |
---|---|
Initial release | 10 September 2014 |
Written in | Java |
Type | Single sign-on system |
License | Apache License 2.0 |
Website | www |
Keycloak is an open source software product to allow single sign-on with identity and access management aimed at modern applications and services. (As of March 2018) this WildFly community project is under the stewardship of Red Hat who use it as the upstream project for their Red Hat Single Sign-On product.[1]
Keycloak supports various protocols such as OpenID, OAuth version 2.0 and SAML and provides features such as user management, two-factor authentication, permissions and roles management, creating token services, etc.[2]
History
The first production release of Keycloak was in September 2014, with development having started about a year earlier. In 2016 Red Hat switched the RH SSO product from being based on the PicketLink framework to being based on the Keycloak upstream Project.[3] This followed a merging of the PicketLink codebase into Keycloak.[4][5]
To some extent Keycloak can now also be considered a replacement of the Red Hat JBoss SSO open source product which was previously superseded by PicketLink.[6][7] (As of March 2018) JBoss.org is redirecting the old jbosssso subsite to the Keycloak website. The JBoss name is a registered trademark and Red Hat moved its upstream open source projects names to avoid using JBoss, JBoss AS to Wildfly being a more commonly recognized example.[8]
Features
The features of Keycloak include:
- User registration
- Social login
- Single sign-on/sign-off across all applications belonging to the same realm
- Two-factor authentication
- LDAP integration
- Kerberos broker
- Multitenancy with per-realm customizable skin
- Custom extensions to extend the core functionality
Components
There are two main components of Keycloak:
- Keycloak server, including the API and graphical interface.
- Keycloak application adapter: a set of libraries to call the server.[9]
See also
References
- ↑ Marchioni, Francesco; Fugaro, Luigi (31 August 2016). "12". Mastering JBoss Enterprise Application Platform 7. Introduction Red Hat SSO. ISBN 978-1786463630. https://www.packtpub.com/mapt/book/web_development/9781786463630/12/ch12lvl1sec75/introducing-red-hat-sso.
- ↑ "Open Source Identity and Access Management". https://www.keycloak.org/.
- ↑ Atkisson, Brian (4 October 2016). "How Red Hat re-designed its Single Sign On (SSO) architecture, and why.". https://developers.redhat.com/blog/2016/10/04/how-red-hat-re-designed-its-single-sign-on-sso-architecture-and-why/.
- ↑ Dawidowicz, Boleslaw (10 March 2015). "PicketLink and Keycloak projects are merging!". http://picketlink.org/news/tags/announcement/.
- ↑ Peeples, Kenneth (28 May 2014). "What is the difference between Picketlink and Keycloak?". http://planet.jboss.org/post/what_is_the_difference_between_picketlink_and_keycloak.
- ↑ "JBosssso (archived) Website". http://jbosssso.jboss.org/.
- ↑ Kalali, Masoud (30 May 2010). GlassFish Security. PACKT. p. 182. ISBN 978-1-847199-38-6.
- ↑ "Load Balancing Wildfly and JBoss Application Servers with NGINX Open Source and NGINX Plus | NGINX Documentation" (in en-us). https://docs.nginx.com/nginx/deployment-guides/load-balance-third-party/wildfly/.
- ↑ "Securing Applications and Services Guide". https://www.keycloak.org/docs/latest/securing_apps/#.
External links
- Official website
- Sébastien Blanc (June 16, 2017). "Easily Secure Your Spring Boot Applications With Keycloak". https://dzone.com/articles/easily-secure-your-spring-boot-applications-with-k.
- Free Keycloak tutorials
- "Writing Keycloak extensions: Key concepts and anti-patterns". November 24, 2022. https://www.zone2.tech/blog/writing-keycloak-extensions-key-concepts-and-anti-patterns.
Original source: https://en.wikipedia.org/wiki/Keycloak.
Read more |