Add authentication to applications and secure services with minimum effort. No need to deal with storing users or authenticating users.
Keycloak provides user federation, strong authentication, user management, fine-grained authorization, and more.
- Documentation
- User Mailing List- Mailing list for help and general questions about Keycloak
If you have found a security vulnerability, please look at theinstructions on how to properly report it.
If you believe you have discovered a defect in Keycloak, please openan issue. Please remember to provide a good summary, description as well as steps to reproduce the issue.
To run Keycloak, download the distribution from ourwebsite.Unzip and run:
bin/kc.[sh|bat] start-dev
Alternatively, you can use the Docker image by running:
docker run quay.io/keycloak/keycloak start-dev
For more details refer to theKeycloak Documentation.
To build from source, refer to thebuilding and working with the code baseguide.
To run tests, refer to therunning testsguide.
To write tests, refer to thewriting testsguide.
Before contributing to Keycloak, please read ourcontributing guidelines.Participation in the Keycloak project is governed by theCNCF Code of Conduct.
Joining acommunity meetingis a great way to get involved and help shape the future of Keycloak.
- Keycloak- Keycloak Server and Java adapters
- Keycloak QuickStarts- QuickStarts for getting started with Keycloak
- Keycloak Node.js Connect- Node.js adapter for Keycloak