* Extend realm UI configuration by OID4VCI attributes Closes #39533 Signed-off-by: forkimenjeckayang <forkimenjeckayang@gmail.com> * update: adjust tests in oid4vci-attributes.spec.ts based on feature availability Signed-off-by: forkimenjeckayang <forkimenjeckayang@gmail.com> * update: directly check OID4VCI feature from server info in tests before running Signed-off-by: forkimenjeckayang <forkimenjeckayang@gmail.com> * update: address comment(s) by @IngridPuppet Signed-off-by: forkimenjeckayang <forkimenjeckayang@gmail.com> * update: skip tests when oid4vci feature is not enabled Signed-off-by: forkimenjeckayang <forkimenjeckayang@gmail.com> * update: move oid4vc realm attributes setting to token tab Signed-off-by: forkimenjeckayang <forkimenjeckayang@gmail.com> * update: refactor tokens tab and restructure oid4vci attributes tests Signed-off-by: forkimenjeckayang <forkimenjeckayang@gmail.com> * update: apply review comments by @jonkoops Signed-off-by: forkimenjeckayang <forkimenjeckayang@gmail.com> * update: refactored tests to use createTestBed() Signed-off-by: forkimenjeckayang <forkimenjeckayang@gmail.com> * update: apply changes by @jonkoops Signed-off-by: forkimenjeckayang <forkimenjeckayang@gmail.com> * update: address review comments Signed-off-by: forkimenjeckayang <forkimenjeckayang@gmail.com> * update: change test format Signed-off-by: forkimenjeckayang <forkimenjeckayang@gmail.com> * update: enable oid4vc feature in worfklows Signed-off-by: forkimenjeckayang <forkimenjeckayang@gmail.com> * Update .github/workflows/stability-js-ci.yml Co-authored-by: Jon Koops <jonkoops@gmail.com> Signed-off-by: forkimenjeckayang <104195313+forkimenjeckayang@users.noreply.github.com> * fix: included required fields in tokens.ts as fix for CI tests Signed-off-by: forkimenjeckayang <forkimenjeckayang@gmail.com> * update: address more review comments Signed-off-by: forkimenjeckayang <forkimenjeckayang@gmail.com> --------- Signed-off-by: forkimenjeckayang <forkimenjeckayang@gmail.com> Signed-off-by: forkimenjeckayang <104195313+forkimenjeckayang@users.noreply.github.com> Co-authored-by: Jon Koops <jonkoops@gmail.com>
Open Source Identity and Access Management
Add authentication to applications and secure services with minimum effort. No need to deal with storing users or authenticating users.
Keycloak provides user federation, strong authentication, user management, fine-grained authorization, and more.
Help and Documentation
- Documentation
- User Mailing List - Mailing list for help and general questions about Keycloak
- Join #keycloak for general questions, or #keycloak-dev on Slack for design and development discussions, by creating an account at https://slack.cncf.io/.
Reporting Security Vulnerabilities
If you have found a security vulnerability, please look at the instructions on how to properly report it.
Reporting an issue
If you believe you have discovered a defect in Keycloak, please open an issue. Please remember to provide a good summary, description as well as steps to reproduce the issue.
Getting started
To run Keycloak, download the distribution from our website. Unzip and run:
bin/kc.[sh|bat] start-dev
Alternatively, you can use the Docker image by running:
docker run quay.io/keycloak/keycloak start-dev
For more details refer to the Keycloak Documentation.
Building from Source
To build from source, refer to the building and working with the code base guide.
Testing
To run tests, refer to the running tests guide.
Writing Tests
To write tests, refer to the writing tests guide.
Contributing
Before contributing to Keycloak, please read our contributing guidelines. Participation in the Keycloak project is governed by the CNCF Code of Conduct.
Joining a community meeting is a great way to get involved and help shape the future of Keycloak.
Other Keycloak Projects
- Keycloak - Keycloak Server and Java adapters
- Keycloak QuickStarts - QuickStarts for getting started with Keycloak
- Keycloak Node.js Connect - Node.js adapter for Keycloak