# keycloak-collective-portal > **WARNING**: this software is in a pre-alpha quality state and is an initial > prototype. It is being developed within the context of > [lumbung.space](https://lumbung.space/) and may have hard-coded values and > configuration specifically for that environment. If the idea of this software > sounds interesting to you, please let us know on the issue tracker! [![Build Status](https://drone.autonomic.zone/api/badges/autonomic-cooperative/keycloak-collective-portal/status.svg?ref=refs/heads/main)](https://drone.autonomic.zone/autonomic-cooperative/keycloak-collective-portal) > Community Keycloak SSO user management This is a tiny Python app that allows you create custom web pages, outside of the Keycloak administration interface, which can be used to manage users in Keycloak. This is done via the REST API. It was designed with collective management in mind. Existing Keycloak users can authenticate with the app and then do things like invite others, send verification emails and so on. Anything that the REST API supports, this app can support. We aim to strive for the usability which is often lacking in Enterprise Software ™ environments (Keycloak is made within the context of RedHat / IBM). This is the No Admins, No Masters edition of Keycloak. ## Feature set - **invite links**: - Any collective member with an existing Keycloak account can log in and generate them - They are valid for 30 days by default (configurable via `INVITE_TIME_LIMIT`) - Anyone with an invite link can create an account on the Keycloak, so don't share publicly! - There is no access granularity on the account creation implemented yet, so the accounts are "global" - Once the user fills in their name, email, password they will receive an email verification mail If you want a feature implemented, please open an issue to discuss. ## Getting Started ### From a system administrator perspective A note on permissions: we use the `admin-cli` client and a fine grained, secure access configuration for making requests from this app to your Keycloak instance. We aim to follow the Keycloak documentation and recommended practices on security so that `keycloak-colective-portal` is a safe option to add into your technology stack. - Ensure that your `admin-cli` client under your Client settings has the following config: - **Settings tab**: - **Access Type**: `confidential` - **Service Accounts Enabled**: `ON` - **Scope tab**: - **Full scope allowed**: `OFF` - **Client roles**: Under `realm-management` add `manage-users` and `view-users` - **Service Account Roles tab**: - **Client roles**: Under `realm-management` add `manage-users` and `view-users` - Deploy using [`coop-cloud/keycloak-colective-portal`](https://git.autonomic.zone/coop-cloud/keycloak-collective-portal) - See the example [.env.sample](.env.sample) for the configuration available, more documentation will follow soon. ### From a collective member perspective - Visit `https://` (ask your system adminstrator friends) - Log in with your usual login details - Follow the instructions on the web page to perform administrative actions ## Hacking It's a [FastAPI](https://fastapi.tiangolo.com/) application (if you know [Flask](https://flask.palletsprojects.com/en/2.0.x/) / [Sanic](https://sanic.readthedocs.io/en/stable/) then it is more or less the same thing). Currently being developed with Python 3.9. Once we move out of the prototype stage, more version compatability will be offered. You'll need a working Keycloak install as well to fill in correct `.env` values. A more covenient development environment will come along shortly too. ``` $ docker run -p 6379:6379 -d redis:6-alpine $ cp .env.sample .env # fill with real values $ set -a && source .env && set +a $ make ```