keycloak
Access the keycloak admin API from Crystal.
Installation
-
Add the dependency to your
shard.yml
:dependencies: keycloak: github: threez/keycloak.cr
-
Run
shards install
Usage
require "keycloak"
KC = Keycloak::Client.new("https://id.example.de/realms/me/.well-known/openid-configuration", "client-id", "secret")
puts KC.user_groups("1f74cab4-8d90-4956-bb54-ecac9176404f")
TODO Write usage instructions here
Implemented
- Users
- Groups
TODO
Keycloak
- Attack Detection
- Authentication Management
- Client Attribute Certificate
- Client Initial Access
- Client Registration Policy
- Client Role Mappings
- Client Scopes
- Clients
- Component
- Identity Providers
- Key
- Protocol Mappers
- Realms Admin
- Role Mapper
- Roles
- Roles (by ID)
- Scope Mappings
Extensions
Contributing
- Fork it (https://github.com/threez/keycloak.cr/fork)
- Create your feature branch (
git checkout -b my-new-feature
) - Commit your changes (
git commit -am 'Add some feature'
) - Push to the branch (
git push origin my-new-feature
) - Create a new Pull Request
Contributors
- Vincent Landgraf - creator and maintainer