keycloak-clojure
terraform-provider-keycloak
keycloak-clojure | terraform-provider-keycloak | |
---|---|---|
1 | 1 | |
145 | 577 | |
- | - | |
7.4 | 6.4 | |
about 1 month ago | 25 days ago | |
Clojure | Go | |
MIT License | MIT License |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
keycloak-clojure
-
Keycloak – Open-Source Identity and Access Management Interview
I use Keycloak a lot for authentication and authorisation and I like its flexibility and richness of features.
Running it in production is a no-brainer, the only problem we got was some bad behaviours of some clients that issue a token for every API call as it can put some stress on Keycloak, has to implements some rate limiting in front ok Keycloak to avoid that.
I try to ease its usage with Clojure with https://github.com/jgrodziski/keycloak-clojure
terraform-provider-keycloak
-
Keycloak – Open-Source Identity and Access Management Interview
The Terraform provider[1] unfortunately is 3rd party and as such doesn't bring and guarantees of correctness other than that of the maintainer. It would be nice to see Keycloak provide an official solution for configuration management other than the K8s operator which is missing a lot of features.
[1] https://github.com/mrparkers/terraform-provider-keycloak
What are some alternatives?
casdoor - An open-source UI-first Identity and Access Management (IAM) / Single-Sign-On (SSO) platform with web UI supporting OAuth 2.0, OIDC, SAML, CAS, LDAP, SCIM, WebAuthn, TOTP, MFA and RADIUS [Moved to: https://github.com/casdoor/casdoor]
typescript - Typescript packages and application to showcase the ZITADEL resource API
private_server - This is the configuration for my private server, with the intention of never having to use manual SSH.
connectivly - Add OAuth + OIDC to your app with a single callback
lua-resty-openidc - OpenID Connect Relying Party and OAuth 2.0 Resource Server implementation in Lua for NGINX / OpenResty
keycloak-config-cli - Import YAML/JSON-formatted configuration files into Keycloak - Configuration as Code for Keycloak.
nginx-openid-connect - Reference implementation of OpenID Connect integration for NGINX Plus
zitadel - ZITADEL - The best of Auth0 and Keycloak combined. Built for the serverless era.