pyoidc
keycloak-demo
pyoidc | keycloak-demo | |
---|---|---|
1 | 1 | |
696 | 109 | |
0.4% | - | |
6.3 | 10.0 | |
16 days ago | over 4 years ago | |
Python | JavaScript | |
GNU General Public License v3.0 or later | - |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
pyoidc
-
Keycloak: Open-Source Identity and Access Management
I really like https://tools.ietf.org/html/draft-ietf-oauth-security-topics with it's evergreen approach and looking forward to oauth2.1 to sum up the current best practices.
Depending on your use case I have good experience with https://github.com/zmartzone/mod_auth_openidc and https://github.com/panva/node-oidc-provider.
https://github.com/OpenIDC/pyoidc also might be a good choice as security researchers in that area did take a look in it...
keycloak-demo
-
Keycloak: Open-Source Identity and Access Management
Is there a minimal config to run and setup keycloak with docker for local development? Most sources suggest exporting and reusing a reale-export.json, but it is missing the user datas and includes lots of (default) options and random uuids. There is a example repo, but it seems out of date and missing some settings: https://github.com/keycloak/keycloak-demo/blob/master/demo-r...
What are some alternatives?
keycloak-ui - keycloak-ui repo is moved.
fusionauth-localization - FusionAuth translations
Keywhiz - A system for distributing and managing secrets
angular-spa-sample - Sample application using OAuth/OpenID Connect.
a12n-server - An open source lightweight OAuth2 server
spring-authorization-server - Spring Authorization Server
Keycloak - Open Source Identity and Access Management For Modern Applications and Services
spring-authorization-serv
OpenID - OpenID Certified™ OpenID Connect Relying Party implementation for Apache HTTP Server 2.x