☆29Jun 6, 2024Updated last year
Alternatives and similar repositories for scim2-compliance-test-suite
Users that are interested in scim2-compliance-test-suite are comparing it to the libraries listed below
Sorting:
- SCIM 2.0 Compliance Test Utility☆22Feb 26, 2025Updated last year
- Configures Keycloak based on a set of JSON configuration files☆20Feb 26, 2026Updated last week
- Java Class Histogram Analyser☆20Feb 5, 2024Updated 2 years ago
- a Keycloak broker mapper that maps a multivalued OIDC claim (e.g.: groups) or SAML attribute (e.g.: groupMembership) into one or more rea…☆20Feb 16, 2026Updated 3 weeks ago
- ☆19Mar 24, 2022Updated 3 years ago
- The UnboundID SCIM 2.0 SDK for Java☆211Updated this week
- This is a sample NodeJS SCIM server that includes debug features☆30Dec 7, 2022Updated 3 years ago
- ☆50Jul 15, 2024Updated last year
- OpenID Shared Signals and Events (SSE) / Continuous Access Evaluation Protocol (CAEP) / Risk Incident Sharing and Coordination (RISC) JSO…☆14Jun 7, 2024Updated last year
- Keycloak SCIM2 Outbound User Provisioning☆26Sep 29, 2024Updated last year
- Contains the Adoptium specific source code overrides and build pipeline script for the Java Mission Control project.☆26Jul 16, 2025Updated 7 months ago
- Example of dynamically branded login theme for Keycloak☆33Oct 15, 2018Updated 7 years ago
- a scim implementation as described in RFC7643 and RFC7644☆143Feb 27, 2026Updated last week
- "I am fluent in over 6 million forms of communication!"☆49Nov 16, 2022Updated 3 years ago
- "Commit information, not traffic" - Vector–Scalar Accumulator (VSA) is a lightweight algorithmic primitive that eliminates write amplific…☆28Dec 2, 2025Updated 3 months ago
- Optimized firmware for RepRap 3D printers based on the Arduino platform.☆11May 28, 2022Updated 3 years ago
- A big data cluster management tool that creates and manages clusters of different technologies.☆21Apr 20, 2015Updated 10 years ago
- Telegram Widget Authenticator For Keycloak☆13Dec 20, 2025Updated 2 months ago
- Reliable Keycloak user migration at scale. Features include bounded concurrency, durable retries, and zero data loss.☆31Jan 13, 2026Updated last month
- Another reverse proxy that provides authentication with OpenID Connect☆10Jul 10, 2023Updated 2 years ago
- ☆11Aug 20, 2018Updated 7 years ago
- The Master Object Model (MOM) is an xAPI profile that denotes how a student's learning can be tracked throught their entire "lifetime" wi…☆12Jul 3, 2025Updated 8 months ago
- A Kong plugin that allows access to an upstream url through a forward proxy (eg. squid).☆11Apr 30, 2018Updated 7 years ago
- The repository contains tooling to setup the container based stack.☆15Mar 3, 2026Updated last week
- redis starter☆13Sep 13, 2017Updated 8 years ago
- browsing through the looking glass☆10Jul 10, 2023Updated 2 years ago
- Example full stack rust project using Sycamore for wasm and actix for backend, implementing BFF and OIDC for authentication.☆11Feb 4, 2023Updated 3 years ago
- Server and development environment provisioning data and configurations☆10Jun 25, 2018Updated 7 years ago
- Clone of google-sparsehash☆17Sep 3, 2011Updated 14 years ago
- A modular, agentic-AI-based adaptive cybersecurity architecture for digital ecosystems. Combines Zero Trust, real-time telemetry, and int…☆21Jul 4, 2025Updated 8 months ago
- Keycloak OpenFGA Custom Event Listener for integrating Keycloak and OpenFGA via Kafka for Fine-Grained Authorization☆15Oct 6, 2023Updated 2 years ago
- Application simulating external APIs for the Practical Rx Workshop☆10May 16, 2015Updated 10 years ago
- Keycloak gRPC extension☆12Mar 2, 2023Updated 3 years ago
- ☆10Dec 30, 2015Updated 10 years ago
- A fast JSON scanner in go.☆10Nov 16, 2023Updated 2 years ago
- POP3 server library for Go☆11Feb 16, 2016Updated 10 years ago
- A PID (proportional/integral/derivative) controller in Elixir. Not to be confused with process ID.☆10Apr 8, 2024Updated last year
- ☆18Jul 1, 2022Updated 3 years ago
- Sample Quarkus CLI application☆11Nov 2, 2022Updated 3 years ago