You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: README.md
+7-2Lines changed: 7 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -41,6 +41,7 @@ The framework provides support for the following features:
41
41
- Database-backed user store using Spring JPA.
42
42
- SSO support for Google
43
43
- SSO support for Facebook
44
+
- SSO support for Keycloak
44
45
- Configuration options to control anonymous access, whitelist URIs, and protect specific URIs requiring a logged-in user session.
45
46
- CSRF protection enabled by default, with example jQuery AJAX calls passing the CSRF token from the Thymeleaf page context.
46
47
- Audit event framework for recording and logging security events, customizable to store audit events in a database or publish them via a REST API.
@@ -102,7 +103,7 @@ The framework sends emails for verification links, forgot password flow, etc...
102
103
103
104
104
105
### SSO OAuth2 with Google and Facebook
105
-
The framework supports SSO OAuth2 with Googleand Facebook. To enable this you need to configure the client id and secret for each provider. This is done in the application.yml (or application.properties) file using the [Spring Security OAuth2 properties](https://docs.spring.io/spring-security/reference/servlet/oauth2/login/core.html). You can see the example configuration in the Demo Project's `application.yml` file.
106
+
The framework supports SSO OAuth2 with Google, Facebook and Keycloak. To enable this you need to configure the client id and secret for each provider. This is done in the application.yml (or application.properties) file using the [Spring Security OAuth2 properties](https://docs.spring.io/spring-security/reference/servlet/oauth2/login/core.html). You can see the example configuration in the Demo Project's `application.yml` file.
For public OAuth you will need a public hostname and HTTPS enabled. You can use ngrok or Cloudflare tunnels to create a public hostname and tunnel to your local machine during development. You can then use the ngrok hostname in your Googleand Facebook developer console configuration.
130
+
For public OAuth you will need a public hostname and HTTPS enabled. You can use ngrok or Cloudflare tunnels to create a public hostname and tunnel to your local machine during development. You can then use the ngrok hostname in your Google, Facebook and Keycloak developer console configuration.
0 commit comments