Login Free Trial Documentation Fully managed servicesPricingAbout

Stars

12642

Watchers

343

Forks

4540

Last Commit

2022-06-02

Programming Language:

Java

License:

apache-2.0

Single sign-on/out

Users authenticate with Keycloak rather than individual applications. This means that your applications don't have to deal with login forms, authenticating users, and storing users. Once logged in to Keycloak, users don't have to log in again to access a different application. This also applies to logging out. The single sign-out means users only have to log out once to be logged out of all applications that use Keycloak.

Identity brokering and social login

With Keycloak, enabling login with social networks is easy to add through the admin console – just select the social network you want to add. No code or changes to your application are required. Keycloak can also authenticate users with OpenID Connect or SAML 2.0 identity providers. Again, this is just a matter of configuring the identity provider through the admin console.

screenshot-software
screenshot-software

User federation

Keycloak has built-in support to connect to LDAP or Active Directory servers. You can also implement your own provider if you have users in other stores, such as a relational database.

Admin console

Through the admin console administrators can centrally manage all aspects of the Keycloak server: enable and disable various features; configure identity brokering and user federation; create and manage applications and services; define fine-grained authorization policies, and manage users, including permissions and sessions.

Deploy Keycloak 30 days free trial
Fast deployments

Select an open-source software and start using it in under 5 minutes.

No vendor lock-in

Migrate your software and data between our supported cloud providers any time you want.

Predictable pricing

A guaranteed monthly price covers everything: compute, storage, bandwidth, updates, security & maintenance.

99.99% uptime SLA

Our in-house monitoring and alerting tools allow us to provide up to 99.99% uptime guarantees for enterprise deployments.

Dedicated Hardware

We deliver all services on dedicated virtual machines: you get full access to the underlying resources and kernel-level security.

Encrypted Everything

All connections between your computer, the dashboard and your services are encrypted end-to-end with TLS, and all data is encrypted at rest.

Frequently Asked Questions

Here are some most commonly asked questions

Your first month is on us!

Start your Free Trial today

Get Started