Skip to content

OpenIdentityPlatform/OpenAM

 
 

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

OpenAM Logo

Latest release Build Deploy Issues Last commit License Downloads Docker Gitter Top language Code size in bytes

Project Overview

Open Access Management (OpenAM) is an access management solution that includes Authentication, SSO, Authorization, Federation, Entitlements, and Web Services Security.

Cross Domain Single Sign On (CDSSO), SAML 2.0, OAuth 2.0 & OpenID Connect ensure that OpenAM integrates easily with legacy, custom, and cloud applications without requiring any modifications. It's a developer-friendly, open-source control solution that allows you to own and protect your user's digital identities.

Key Features

Authentication Management

With OpenAM you can set up complex authentication processes using various authentication methods, such as login and password, OTP, saved cookie, QR authentication, and more... OpenAM also supports third-party identity providers using SAML, OAuth2, NTLM, and Kerberos protocols.

Access Management

Integrations with OpenIG or OpenAM Policy Agent allow you to set up flexible access policies to your resources. There could be role-based, authentication level-based, or attribute-based and, if you need flexible logic, you can script access policy.

Cross Domain Single Sign-On

After a single authentication, a user gets access to all resources protected by OpenAM. So, there is no need to authenticate at other services.

Federation

OpenAM supports OAuth2/OIDC and SAMLv2 Federation protocols, so OpenAM can act as both Identity and Service Provider.

Extensibility

If you have to extend OpenAM functionality, it is relatively easy to do. OpenAM pluggable architecture allows modification relatively easy. You can implement your custom authentication module, user data source, session data source, post-authentication process logic, and more...

License

This project is licensed under the Common Development and Distribution License (CDDL).

Downloads

Download OpenAM Policy Agents:

OpenAM Quick Start Guide

How-to Build OpenAM from Source

To build OpenAM from source you should use JDK 8 or higher

For Windows users before clone and build run the following command:

git config --system core.longpaths true
git clone https://github.com/OpenIdentityPlatform/OpenAM.git
mvn install -f OpenAM

How-to Run After the Build

Add FQDN host name in /etc/hosts (Windows c:\windows\systems32\drivers\etc\hosts) file:

127.0.0.1 login.domain.com

Run OpenAM from source:

mvn cargo:run -f OpenAM/openam-server

The next step is then to go to http://login.domain.com:8080/openam where you'll see the OpenAM welcome page


Important Note

You must allocate at least 1024m (2048m with embedded OpenDJ) heap memory for OpenAM JVM using -Xmx option.

For example, -Xmx2048m


How To Guides

Support and Mailing List Information

Contributing

Please, make Pull request

Thanks for OpenAM

  • Sun Access Manager
  • Sun OpenSSO
  • Oracle OpenSSO
  • Forgerock OpenAM