Login to Jenkins with Keycloak

Thanks to Nadeem Mohammad it’s now easy to login to your Jenkins server with Keycloak. For more details have a look at Jenkins Wiki and the Youtube demo. The source code is available in our github.

Posted in Uncategorized

Keycloak 1.1.0.Final Released

The Keycloak team is proud to announce the release of Keycloak 1.1.0.Final. Highlights in this release includes:

  • SAML 2.0
  • Clustering
  • Jetty, Tomcat and Fuse adapters
  • HTTP Security Proxy
  • Automatic migration of db schema

We’re already started working on features for the next release. Some exiting features coming soon includes:

  • Identity brokering
  • Custom user profiles
  • Kerberos
  • OpenID Connect interop
Posted in Uncategorized

Merry Christmas from the Keycloak team

2014 was the year of Keycloak! At least that was the case for us on the Keycloak team. In January we released the very first alpha of the project. The first stable release wasn’t out until September, but in return we added a lot more features as well as reaching a very high level of stability for a 1.0.

Since then we’ve delivered a number of security and bug fixes for 1.0, while continuing to bake in new exiting features for 1.1. We’re planning to do a stable release of 1.1 early in the New Year, which will bring SAML 2, much improved clustering and a number of new application adapters.

Not only have we managed to provide a feature rich and easy to use open source security solution, but we’ve also managed to build an awesome community around the project. We’ve had over 5000 downloads, over 2500 commits from 32 contributors and our developer and user mailing lists are very active. Keycloak is already in use in production on a number of projects, in fact some has even used it in production since our first alpha release!

Our road-map for 2015 is not written in stone, but expect at least some of the following features to be delivered in 2015:

  • Custom user profiles – this will let you configure the attributes for a user profile, which should be visible on the registration screen and account management, as well as specify validation
  • Identity Brokering – we’re adding support to authenticate with external Identity Providers via OpenID Connect, SAML 2.0 and Kerberos
  • Two-Factor Authentication – currently we only support Google Authenticator or FreeOTP applications for two-factor authentication, but we plan to make it possible to add your own and provide some more out of the box
  • Client Accounts – these will be special user accounts directly linked to a client, allowing a client to access services as itself not just on-behalf of users
  • Client Certificates – support authentication of clients with certificates
  • Client Types – at the moment we have applications and oauth clients, the main difference being oauth clients require users to grant permissions to roles. To simplify the admin console we plan to introduce a single unified view for clients and also introduce new types such as devices
  • Internationalization – internationalization support for login and account management pages
  • SMS – enable SMS to recover passwords, as a 2nd factor authentication mechanism and to be notified about events like login failures
  • OpenID Connect Dynamic Registration –  allows clients to dynamically register with Keycloak. We’ll also look at passing the OpenID Connect Interop testing
  • Mapping of users and tokens – custom mapping of user profiles from external identity stores and tokens from external Identity Providers

We also have ideas for some bigger features, but we’ll leave those as a surprise for 2015!

Finally, I’d like to wish everyone a Merry Christmas and a Happy New Year.

Posted in Uncategorized

Keycloak 1.1.0 Beta1 Released

Pretty big feature release:
  • SAML 2.0 support.  Keycloak already supports OpenID Connect, but with this release we’re also introducing support for SAML 2.0.  We did this by pulling in and building on top of Picketlink’s SAML libraries.
  • Vastly improved clustering support.  We’ve also significantly improved our clustering support, for the server and application adapters. The server can now be configured to use an invalidation cache for realm meta-data and user profiles, while user-sessions can be stored in a distributed cache allowing for both increased scalability and availability. Application adapters can be configured for either sticky-session or stateless if sticky-sessions are not available. We’ve also added support for nodes to dynamically register with Keycloak to receive for example logout notifications.
  • Adapter multi-tenancy support.  Thanks to Juraci Paixão Kröhling we now have multi-tenancy support in application adapters. His contribution makes it easy to use more than one realm for a single application. It’s up to you to decide which realm is used for a request, but this could for example be depending on domain name or context-path. For anyone interested in this feature there’s a simple example that shows how to get started.
  • Tomcat 7 Adapter.  A while back Davide Ungari contributed a Tomcat 7 application adapter for Keycloak, but we haven’t had time to document, test and make it a supported adapter until now.
What’s next?
The next release of Keycloak should see the introduction of more application adapters, with support for JBoss BRMS, JBoss Fuse, UberFire, Hawt.io and Jetty.
For a complete list of all features and fixes for this release check out JIRA.
I’d like to especially thank all external contributors, please keep contributing! For everyone wanting to contribute Keycloak don’t hesitate, it’s easy to get started and we’re here to help if you need any pointers.
Posted in Uncategorized

Keycloak 1.0.3.Final released

Another security and bug fix release in the 1.0 series.

For full details look in JIRA.

Posted in Uncategorized

Keycloak 1.0.2.Final released

This is a maintenance release and contains only bug fixes and one minor security fix.

For full details look in JIRA

Posted in Uncategorized

Keycloak 1.0.1 Final Released

We’re releasing a few minor fixes and improvements before we start work on SAML and Clustering.

As usual go to keycloak.org to download the release, and have a look at jira for the complete list of fixes and improvements.

Posted in Uncategorized

Get every new post delivered to your Inbox.