Fixing topics.adoc and cross-references
This commit is contained in:
parent
a0b31dced3
commit
2cb26dd703
2 changed files with 2 additions and 2 deletions
|
@ -26,7 +26,7 @@ The Execution requirements section includes an example of the OTP form.
|
||||||
`Condition - User Attribute`::
|
`Condition - User Attribute`::
|
||||||
This checks if the user has set up the required attribute.
|
This checks if the user has set up the required attribute.
|
||||||
There is a possibility to negate output, which means the user should not have the attribute.
|
There is a possibility to negate output, which means the user should not have the attribute.
|
||||||
The <<_user-attributes,User Attributes>> section shows how to add a custom attribute.
|
The xref:proc-configuring-user-attributes_{context}[User Attributes] section shows how to add a custom attribute.
|
||||||
You can provide these fields:
|
You can provide these fields:
|
||||||
|
|
||||||
Alias:::
|
Alias:::
|
||||||
|
|
|
@ -37,7 +37,6 @@ Create User If Unique::
|
||||||
* If an account exists, the authenticator implements the next `Handle Existing Account` sub-flow.
|
* If an account exists, the authenticator implements the next `Handle Existing Account` sub-flow.
|
||||||
* To ensure there is no duplicated account, you can mark this authenticator as `REQUIRED`. The user sees the error page if a {project_name} account exists, and users must link their identity provider account through Account management.
|
* To ensure there is no duplicated account, you can mark this authenticator as `REQUIRED`. The user sees the error page if a {project_name} account exists, and users must link their identity provider account through Account management.
|
||||||
|
|
||||||
NOTE: If you want to skip the ability to create new users, but you want that users authenticated from identity provider must already exists in {project_name} with same username or email like the user from identity provider, you can create new flow and replace `Create User If Exists` authenticator with `Detect Existing Broker User` . More details in the <<Detect Existing User First Login Flow,examples below>>.
|
|
||||||
|
|
||||||
Confirm Link Existing Account::
|
Confirm Link Existing Account::
|
||||||
* On the information page, users see a {project_name} account with the same email. Users can review their profile again and use a different email or username. The flow restarts and goes back to the `Review Profile` authenticator.
|
* On the information page, users see a {project_name} account with the same email. Users can review their profile again and use a different email or username. The flow restarts and goes back to the `Review Profile` authenticator.
|
||||||
|
@ -92,6 +91,7 @@ To disable user creation:
|
||||||
This configuration also implies that Keycloak itself won't be able to determine which internal account would correspond to the external identity.
|
This configuration also implies that Keycloak itself won't be able to determine which internal account would correspond to the external identity.
|
||||||
Therefore, the `Verify Existing Account By Re-authentication` authenticator will ask the user to provide both username and password.
|
Therefore, the `Verify Existing Account By Re-authentication` authenticator will ask the user to provide both username and password.
|
||||||
|
|
||||||
|
[[_detect_existing_user_first_loging_flow]]
|
||||||
==== Detect Existing User First Login Flow
|
==== Detect Existing User First Login Flow
|
||||||
In order to configure a first login flow in which:
|
In order to configure a first login flow in which:
|
||||||
|
|
||||||
|
|
Loading…
Reference in a new issue