KEYCLOAK-3373 Remove SAML IdP descriptor from client installation and publicize it in realm endpoint instead
This commit is contained in:
parent
a868b8b22a
commit
1c906c834b
7 changed files with 29 additions and 189 deletions
|
@ -37,7 +37,6 @@ import org.keycloak.events.Details;
|
||||||
import org.keycloak.events.Errors;
|
import org.keycloak.events.Errors;
|
||||||
import org.keycloak.events.EventBuilder;
|
import org.keycloak.events.EventBuilder;
|
||||||
import org.keycloak.events.EventType;
|
import org.keycloak.events.EventType;
|
||||||
import org.keycloak.keys.RsaKeyMetadata;
|
|
||||||
import org.keycloak.models.AuthenticatedClientSessionModel;
|
import org.keycloak.models.AuthenticatedClientSessionModel;
|
||||||
import org.keycloak.models.ClientModel;
|
import org.keycloak.models.ClientModel;
|
||||||
import org.keycloak.models.KeyManager;
|
import org.keycloak.models.KeyManager;
|
||||||
|
@ -80,6 +79,9 @@ import java.util.Properties;
|
||||||
import java.util.Set;
|
import java.util.Set;
|
||||||
import java.util.TreeSet;
|
import java.util.TreeSet;
|
||||||
import org.keycloak.common.util.StringPropertyReplacer;
|
import org.keycloak.common.util.StringPropertyReplacer;
|
||||||
|
import org.keycloak.crypto.Algorithm;
|
||||||
|
import org.keycloak.crypto.KeyUse;
|
||||||
|
import org.keycloak.crypto.KeyWrapper;
|
||||||
import org.keycloak.dom.saml.v2.metadata.KeyTypes;
|
import org.keycloak.dom.saml.v2.metadata.KeyTypes;
|
||||||
import org.keycloak.rotation.HardcodedKeyLocator;
|
import org.keycloak.rotation.HardcodedKeyLocator;
|
||||||
import org.keycloak.rotation.KeyLocator;
|
import org.keycloak.rotation.KeyLocator;
|
||||||
|
@ -87,6 +89,8 @@ import org.keycloak.saml.SPMetadataDescriptor;
|
||||||
import org.keycloak.saml.processing.core.util.KeycloakKeySamlExtensionGenerator;
|
import org.keycloak.saml.processing.core.util.KeycloakKeySamlExtensionGenerator;
|
||||||
import org.keycloak.saml.validators.DestinationValidator;
|
import org.keycloak.saml.validators.DestinationValidator;
|
||||||
import org.keycloak.sessions.AuthenticationSessionModel;
|
import org.keycloak.sessions.AuthenticationSessionModel;
|
||||||
|
import java.nio.charset.StandardCharsets;
|
||||||
|
import java.util.logging.Level;
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Resource class for the saml connect token service
|
* Resource class for the saml connect token service
|
||||||
|
@ -590,27 +594,33 @@ public class SamlService extends AuthorizationEndpointBase {
|
||||||
|
|
||||||
}
|
}
|
||||||
|
|
||||||
public static String getIDPMetadataDescriptor(UriInfo uriInfo, KeycloakSession session, RealmModel realm) throws IOException {
|
public static String getIDPMetadataDescriptor(UriInfo uriInfo, KeycloakSession session, RealmModel realm) {
|
||||||
InputStream is = SamlService.class.getResourceAsStream("/idp-metadata-template.xml");
|
InputStream is = SamlService.class.getResourceAsStream("/idp-metadata-template.xml");
|
||||||
String template = StreamUtil.readString(is);
|
String template;
|
||||||
|
try {
|
||||||
|
template = StreamUtil.readString(is, StandardCharsets.UTF_8);
|
||||||
|
} catch (IOException ex) {
|
||||||
|
logger.error("Cannot generate IdP metadata", ex);
|
||||||
|
return "";
|
||||||
|
}
|
||||||
Properties props = new Properties();
|
Properties props = new Properties();
|
||||||
props.put("idp.entityID", RealmsResource.realmBaseUrl(uriInfo).build(realm.getName()).toString());
|
props.put("idp.entityID", RealmsResource.realmBaseUrl(uriInfo).build(realm.getName()).toString());
|
||||||
props.put("idp.sso.HTTP-POST", RealmsResource.protocolUrl(uriInfo).build(realm.getName(), SamlProtocol.LOGIN_PROTOCOL).toString());
|
props.put("idp.sso.HTTP-POST", RealmsResource.protocolUrl(uriInfo).build(realm.getName(), SamlProtocol.LOGIN_PROTOCOL).toString());
|
||||||
props.put("idp.sso.HTTP-Redirect", RealmsResource.protocolUrl(uriInfo).build(realm.getName(), SamlProtocol.LOGIN_PROTOCOL).toString());
|
props.put("idp.sso.HTTP-Redirect", RealmsResource.protocolUrl(uriInfo).build(realm.getName(), SamlProtocol.LOGIN_PROTOCOL).toString());
|
||||||
props.put("idp.sls.HTTP-POST", RealmsResource.protocolUrl(uriInfo).build(realm.getName(), SamlProtocol.LOGIN_PROTOCOL).toString());
|
props.put("idp.sls.HTTP-POST", RealmsResource.protocolUrl(uriInfo).build(realm.getName(), SamlProtocol.LOGIN_PROTOCOL).toString());
|
||||||
StringBuilder keysString = new StringBuilder();
|
StringBuilder keysString = new StringBuilder();
|
||||||
Set<RsaKeyMetadata> keys = new TreeSet<>((o1, o2) -> o1.getStatus() == o2.getStatus() // Status can be only PASSIVE OR ACTIVE, push PASSIVE to end of list
|
Set<KeyWrapper> keys = new TreeSet<>((o1, o2) -> o1.getStatus() == o2.getStatus() // Status can be only PASSIVE OR ACTIVE, push PASSIVE to end of list
|
||||||
? (int) (o2.getProviderPriority() - o1.getProviderPriority())
|
? (int) (o2.getProviderPriority() - o1.getProviderPriority())
|
||||||
: (o1.getStatus() == KeyStatus.PASSIVE ? 1 : -1));
|
: (o1.getStatus() == KeyStatus.PASSIVE ? 1 : -1));
|
||||||
keys.addAll(session.keys().getRsaKeys(realm));
|
keys.addAll(session.keys().getKeys(realm, KeyUse.SIG, Algorithm.RS256));
|
||||||
for (RsaKeyMetadata key : keys) {
|
for (KeyWrapper key : keys) {
|
||||||
addKeyInfo(keysString, key, KeyTypes.SIGNING.value());
|
addKeyInfo(keysString, key, KeyTypes.SIGNING.value());
|
||||||
}
|
}
|
||||||
props.put("idp.signing.certificates", keysString.toString());
|
props.put("idp.signing.certificates", keysString.toString());
|
||||||
return StringPropertyReplacer.replaceProperties(template, props);
|
return StringPropertyReplacer.replaceProperties(template, props);
|
||||||
}
|
}
|
||||||
|
|
||||||
private static void addKeyInfo(StringBuilder target, RsaKeyMetadata key, String purpose) {
|
private static void addKeyInfo(StringBuilder target, KeyWrapper key, String purpose) {
|
||||||
if (key == null) {
|
if (key == null) {
|
||||||
return;
|
return;
|
||||||
}
|
}
|
||||||
|
|
|
@ -26,6 +26,7 @@ import org.keycloak.protocol.ClientInstallationProvider;
|
||||||
import org.keycloak.protocol.saml.SamlClient;
|
import org.keycloak.protocol.saml.SamlClient;
|
||||||
import org.keycloak.protocol.saml.SamlProtocol;
|
import org.keycloak.protocol.saml.SamlProtocol;
|
||||||
|
|
||||||
|
import org.keycloak.protocol.saml.SamlService;
|
||||||
import javax.ws.rs.core.Response;
|
import javax.ws.rs.core.Response;
|
||||||
import java.io.ByteArrayOutputStream;
|
import java.io.ByteArrayOutputStream;
|
||||||
import java.io.IOException;
|
import java.io.IOException;
|
||||||
|
@ -43,7 +44,7 @@ public class ModAuthMellonClientInstallation implements ClientInstallationProvid
|
||||||
SamlClient samlClient = new SamlClient(client);
|
SamlClient samlClient = new SamlClient(client);
|
||||||
ByteArrayOutputStream baos = new ByteArrayOutputStream();
|
ByteArrayOutputStream baos = new ByteArrayOutputStream();
|
||||||
ZipOutputStream zip = new ZipOutputStream(baos);
|
ZipOutputStream zip = new ZipOutputStream(baos);
|
||||||
String idpDescriptor = SamlIDPDescriptorClientInstallation.getIDPDescriptorForClient(session, realm, client, serverBaseUri);
|
String idpDescriptor = SamlService.getIDPMetadataDescriptor(session.getContext().getUri(), session, realm);
|
||||||
String spDescriptor = SamlSPDescriptorClientInstallation.getSPDescriptorForClient(client);
|
String spDescriptor = SamlSPDescriptorClientInstallation.getSPDescriptorForClient(client);
|
||||||
String clientDirName = client.getClientId()
|
String clientDirName = client.getClientId()
|
||||||
.replace('/', '_')
|
.replace('/', '_')
|
||||||
|
|
|
@ -1,171 +0,0 @@
|
||||||
/*
|
|
||||||
* Copyright 2016 Red Hat, Inc. and/or its affiliates
|
|
||||||
* and other contributors as indicated by the @author tags.
|
|
||||||
*
|
|
||||||
* Licensed under the Apache License, Version 2.0 (the "License");
|
|
||||||
* you may not use this file except in compliance with the License.
|
|
||||||
* You may obtain a copy of the License at
|
|
||||||
*
|
|
||||||
* http://www.apache.org/licenses/LICENSE-2.0
|
|
||||||
*
|
|
||||||
* Unless required by applicable law or agreed to in writing, software
|
|
||||||
* distributed under the License is distributed on an "AS IS" BASIS,
|
|
||||||
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
||||||
* See the License for the specific language governing permissions and
|
|
||||||
* limitations under the License.
|
|
||||||
*/
|
|
||||||
|
|
||||||
package org.keycloak.protocol.saml.installation;
|
|
||||||
|
|
||||||
import org.keycloak.Config;
|
|
||||||
import org.keycloak.common.util.PemUtils;
|
|
||||||
import org.keycloak.crypto.KeyStatus;
|
|
||||||
import org.keycloak.dom.saml.v2.metadata.KeyTypes;
|
|
||||||
import org.keycloak.keys.RsaKeyMetadata;
|
|
||||||
import org.keycloak.models.ClientModel;
|
|
||||||
import org.keycloak.models.KeycloakSession;
|
|
||||||
import org.keycloak.models.KeycloakSessionFactory;
|
|
||||||
import org.keycloak.models.RealmModel;
|
|
||||||
import org.keycloak.protocol.ClientInstallationProvider;
|
|
||||||
import org.keycloak.protocol.saml.SamlClient;
|
|
||||||
import org.keycloak.protocol.saml.SamlProtocol;
|
|
||||||
import org.keycloak.saml.SPMetadataDescriptor;
|
|
||||||
import org.keycloak.services.resources.RealmsResource;
|
|
||||||
|
|
||||||
import javax.ws.rs.core.MediaType;
|
|
||||||
import javax.ws.rs.core.Response;
|
|
||||||
import javax.ws.rs.core.UriBuilder;
|
|
||||||
import java.net.URI;
|
|
||||||
import java.util.Set;
|
|
||||||
import java.util.TreeSet;
|
|
||||||
|
|
||||||
/**
|
|
||||||
* @author <a href="mailto:bill@burkecentral.com">Bill Burke</a>
|
|
||||||
* @version $Revision: 1 $
|
|
||||||
*/
|
|
||||||
public class SamlIDPDescriptorClientInstallation implements ClientInstallationProvider {
|
|
||||||
public static String getIDPDescriptorForClient(KeycloakSession session, RealmModel realm, ClientModel client, URI serverBaseUri) {
|
|
||||||
SamlClient samlClient = new SamlClient(client);
|
|
||||||
String idpEntityId = RealmsResource.realmBaseUrl(UriBuilder.fromUri(serverBaseUri)).build(realm.getName()).toString();
|
|
||||||
String bindUrl = RealmsResource.protocolUrl(UriBuilder.fromUri(serverBaseUri)).build(realm.getName(), SamlProtocol.LOGIN_PROTOCOL).toString();
|
|
||||||
StringBuilder sb = new StringBuilder();
|
|
||||||
sb.append("<?xml version=\"1.0\" encoding=\"UTF-8\"?>\n"
|
|
||||||
+ "<EntityDescriptor entityID=\"").append(idpEntityId).append("\"\n"
|
|
||||||
+ " xmlns=\"urn:oasis:names:tc:SAML:2.0:metadata\"\n"
|
|
||||||
+ " xmlns:dsig=\"http://www.w3.org/2000/09/xmldsig#\"\n"
|
|
||||||
+ " xmlns:xsi=\"http://www.w3.org/2001/XMLSchema-instance\">\n"
|
|
||||||
+ " <IDPSSODescriptor WantAuthnRequestsSigned=\"")
|
|
||||||
.append(samlClient.requiresClientSignature())
|
|
||||||
.append("\"\n"
|
|
||||||
+ " protocolSupportEnumeration=\"urn:oasis:names:tc:SAML:2.0:protocol\">\n");
|
|
||||||
|
|
||||||
// logout service
|
|
||||||
sb.append(" <SingleLogoutService\n"
|
|
||||||
+ " Binding=\"urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST\"\n"
|
|
||||||
+ " Location=\"").append(bindUrl).append("\" />\n");
|
|
||||||
if (! samlClient.forcePostBinding()) {
|
|
||||||
sb.append(" <SingleLogoutService\n"
|
|
||||||
+ " Binding=\"urn:oasis:names:tc:SAML:2.0:bindings:HTTP-Redirect\"\n"
|
|
||||||
+ " Location=\"").append(bindUrl).append("\" />\n");
|
|
||||||
}
|
|
||||||
// nameid format
|
|
||||||
if (samlClient.forceNameIDFormat() && samlClient.getNameIDFormat() != null) {
|
|
||||||
sb.append(" <NameIDFormat>").append(samlClient.getNameIDFormat()).append("</NameIDFormat>\n");
|
|
||||||
} else {
|
|
||||||
sb.append(" <NameIDFormat>urn:oasis:names:tc:SAML:2.0:nameid-format:persistent</NameIDFormat>\n"
|
|
||||||
+ " <NameIDFormat>urn:oasis:names:tc:SAML:2.0:nameid-format:transient</NameIDFormat>\n"
|
|
||||||
+ " <NameIDFormat>urn:oasis:names:tc:SAML:1.1:nameid-format:unspecified</NameIDFormat>\n"
|
|
||||||
+ " <NameIDFormat>urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress</NameIDFormat>\n");
|
|
||||||
}
|
|
||||||
// sign on service
|
|
||||||
sb.append("\n"
|
|
||||||
+ " <SingleSignOnService Binding=\"urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST\"\n"
|
|
||||||
+ " Location=\"").append(bindUrl).append("\" />\n");
|
|
||||||
if (! samlClient.forcePostBinding()) {
|
|
||||||
sb.append(" <SingleSignOnService Binding=\"urn:oasis:names:tc:SAML:2.0:bindings:HTTP-Redirect\"\n"
|
|
||||||
+ " Location=\"").append(bindUrl).append("\" />\n");
|
|
||||||
|
|
||||||
}
|
|
||||||
|
|
||||||
// keys
|
|
||||||
Set<RsaKeyMetadata> keys = new TreeSet<>((o1, o2) -> o1.getStatus() == o2.getStatus() // Status can be only PASSIVE OR ACTIVE, push PASSIVE to end of list
|
|
||||||
? (int) (o2.getProviderPriority() - o1.getProviderPriority())
|
|
||||||
: (o1.getStatus() == KeyStatus.PASSIVE ? 1 : -1));
|
|
||||||
keys.addAll(session.keys().getRsaKeys(realm));
|
|
||||||
for (RsaKeyMetadata key : keys) {
|
|
||||||
addKeyInfo(sb, key, KeyTypes.SIGNING.value());
|
|
||||||
}
|
|
||||||
|
|
||||||
sb.append(" </IDPSSODescriptor>\n"
|
|
||||||
+ "</EntityDescriptor>\n");
|
|
||||||
return sb.toString();
|
|
||||||
}
|
|
||||||
|
|
||||||
private static void addKeyInfo(StringBuilder target, RsaKeyMetadata key, String purpose) {
|
|
||||||
if (key == null) {
|
|
||||||
return;
|
|
||||||
}
|
|
||||||
|
|
||||||
target.append(SPMetadataDescriptor.xmlKeyInfo(" ", key.getKid(), PemUtils.encodeCertificate(key.getCertificate()), purpose, false));
|
|
||||||
}
|
|
||||||
|
|
||||||
@Override
|
|
||||||
public Response generateInstallation(KeycloakSession session, RealmModel realm, ClientModel client, URI serverBaseUri) {
|
|
||||||
String descriptor = getIDPDescriptorForClient(session, realm, client, serverBaseUri);
|
|
||||||
return Response.ok(descriptor, MediaType.TEXT_PLAIN_TYPE).build();
|
|
||||||
}
|
|
||||||
|
|
||||||
@Override
|
|
||||||
public String getProtocol() {
|
|
||||||
return SamlProtocol.LOGIN_PROTOCOL;
|
|
||||||
}
|
|
||||||
|
|
||||||
@Override
|
|
||||||
public String getDisplayType() {
|
|
||||||
return "SAML Metadata IDPSSODescriptor";
|
|
||||||
}
|
|
||||||
|
|
||||||
@Override
|
|
||||||
public String getHelpText() {
|
|
||||||
return "SAML Metadata IDPSSODescriptor tailored for the client. This is special because not every client may require things like digital signatures";
|
|
||||||
}
|
|
||||||
|
|
||||||
@Override
|
|
||||||
public String getFilename() {
|
|
||||||
return "client-tailored-saml-idp-metadata.xml";
|
|
||||||
}
|
|
||||||
|
|
||||||
public String getMediaType() {
|
|
||||||
return MediaType.APPLICATION_XML;
|
|
||||||
}
|
|
||||||
|
|
||||||
@Override
|
|
||||||
public boolean isDownloadOnly() {
|
|
||||||
return false;
|
|
||||||
}
|
|
||||||
|
|
||||||
@Override
|
|
||||||
public void close() {
|
|
||||||
|
|
||||||
}
|
|
||||||
|
|
||||||
@Override
|
|
||||||
public ClientInstallationProvider create(KeycloakSession session) {
|
|
||||||
return this;
|
|
||||||
}
|
|
||||||
|
|
||||||
@Override
|
|
||||||
public void init(Config.Scope config) {
|
|
||||||
|
|
||||||
}
|
|
||||||
|
|
||||||
@Override
|
|
||||||
public void postInit(KeycloakSessionFactory factory) {
|
|
||||||
|
|
||||||
}
|
|
||||||
|
|
||||||
@Override
|
|
||||||
public String getId() {
|
|
||||||
return "saml-idp-descriptor";
|
|
||||||
}
|
|
||||||
}
|
|
|
@ -19,7 +19,6 @@ org.keycloak.protocol.oidc.installation.KeycloakOIDCClientInstallation
|
||||||
org.keycloak.protocol.oidc.installation.KeycloakOIDCJbossSubsystemClientInstallation
|
org.keycloak.protocol.oidc.installation.KeycloakOIDCJbossSubsystemClientInstallation
|
||||||
org.keycloak.protocol.saml.installation.KeycloakSamlClientInstallation
|
org.keycloak.protocol.saml.installation.KeycloakSamlClientInstallation
|
||||||
org.keycloak.protocol.saml.installation.SamlSPDescriptorClientInstallation
|
org.keycloak.protocol.saml.installation.SamlSPDescriptorClientInstallation
|
||||||
org.keycloak.protocol.saml.installation.SamlIDPDescriptorClientInstallation
|
|
||||||
org.keycloak.protocol.saml.installation.ModAuthMellonClientInstallation
|
org.keycloak.protocol.saml.installation.ModAuthMellonClientInstallation
|
||||||
org.keycloak.protocol.saml.installation.KeycloakSamlSubsystemInstallation
|
org.keycloak.protocol.saml.installation.KeycloakSamlSubsystemInstallation
|
||||||
org.keycloak.protocol.docker.installation.DockerVariableOverrideInstallationProvider
|
org.keycloak.protocol.docker.installation.DockerVariableOverrideInstallationProvider
|
||||||
|
|
|
@ -27,6 +27,7 @@ import org.keycloak.testsuite.admin.ApiUtil;
|
||||||
import org.keycloak.testsuite.arquillian.AuthServerTestEnricher;
|
import org.keycloak.testsuite.arquillian.AuthServerTestEnricher;
|
||||||
import org.keycloak.testsuite.util.AdminEventPaths;
|
import org.keycloak.testsuite.util.AdminEventPaths;
|
||||||
|
|
||||||
|
import javax.ws.rs.NotFoundException;
|
||||||
import static org.junit.Assert.assertThat;
|
import static org.junit.Assert.assertThat;
|
||||||
import static org.hamcrest.Matchers.*;
|
import static org.hamcrest.Matchers.*;
|
||||||
|
|
||||||
|
@ -139,13 +140,9 @@ public class InstallationTest extends AbstractClientTest {
|
||||||
assertThat(config, containsString(authServerUrl()));
|
assertThat(config, containsString(authServerUrl()));
|
||||||
}
|
}
|
||||||
|
|
||||||
@Test
|
@Test(expected = NotFoundException.class)
|
||||||
public void testSamlMetadataIdpDescriptor() {
|
public void testSamlMetadataIdpDescriptor() {
|
||||||
String xml = samlClient.getInstallationProvider("saml-idp-descriptor");
|
samlClient.getInstallationProvider("saml-idp-descriptor");
|
||||||
assertThat(xml, containsString("<EntityDescriptor"));
|
|
||||||
assertThat(xml, containsString("<IDPSSODescriptor"));
|
|
||||||
assertThat(xml, containsString(ApiUtil.findActiveKey(testRealmResource()).getCertificate()));
|
|
||||||
assertThat(xml, containsString(samlUrl()));
|
|
||||||
}
|
}
|
||||||
|
|
||||||
@Test
|
@Test
|
||||||
|
|
|
@ -24,7 +24,9 @@ endpoints=Endpoints
|
||||||
|
|
||||||
# Realm settings
|
# Realm settings
|
||||||
realm-detail.enabled.tooltip=Users and clients can only access a realm if it's enabled
|
realm-detail.enabled.tooltip=Users and clients can only access a realm if it's enabled
|
||||||
realm-detail.oidc-endpoints.tooltip=Shows the configuration of the OpenID Connect endpoints
|
realm-detail.protocol-endpoints.tooltip=Shows the configuration of the protocol endpoints
|
||||||
|
realm-detail.protocol-endpoints.oidc=OpenID Endpoint Configuration
|
||||||
|
realm-detail.protocol-endpoints.saml=SAML 2.0 Identity Provider Metadata
|
||||||
realm-detail.userManagedAccess.tooltip=If enabled, users are allowed to manage their resources and permissions using the Account Management Console.
|
realm-detail.userManagedAccess.tooltip=If enabled, users are allowed to manage their resources and permissions using the Account Management Console.
|
||||||
userManagedAccess=User-Managed Access
|
userManagedAccess=User-Managed Access
|
||||||
registrationAllowed=User registration
|
registrationAllowed=User registration
|
||||||
|
|
|
@ -50,9 +50,11 @@
|
||||||
<div class="form-group">
|
<div class="form-group">
|
||||||
<label class="col-md-2 control-label">{{:: 'endpoints' | translate}}</label>
|
<label class="col-md-2 control-label">{{:: 'endpoints' | translate}}</label>
|
||||||
<div class="col-md-6">
|
<div class="col-md-6">
|
||||||
<a class="form-control" ng-href="{{authUrl}}/realms/{{realm.realm}}/.well-known/openid-configuration" target="_blank">OpenID Endpoint Configuration</a>
|
<a class="form-control" ng-href="{{authUrl}}/realms/{{realm.realm}}/.well-known/openid-configuration" target="_blank">{{:: 'realm-detail.protocol-endpoints.oidc' | translate}}</a>
|
||||||
|
|
||||||
|
<a class="form-control" ng-href="{{authUrl}}/realms/{{realm.realm}}/protocol/saml/descriptor" target="_blank">{{:: 'realm-detail.protocol-endpoints.saml' | translate}}</a>
|
||||||
</div>
|
</div>
|
||||||
<kc-tooltip>{{:: 'realm-detail.oidc-endpoints.tooltip' | translate}}</kc-tooltip>
|
<kc-tooltip>{{:: 'realm-detail.protocol-endpoints.tooltip' | translate}}</kc-tooltip>
|
||||||
</div>
|
</div>
|
||||||
|
|
||||||
<div class="form-group">
|
<div class="form-group">
|
||||||
|
|
Loading…
Reference in a new issue