commit
c1ae0aa963
1 changed files with 119 additions and 181 deletions
|
@ -454,18 +454,6 @@ For example:
|
|||
$ kcadm.sh get-roles -r demorealm --cclientid realm-management
|
||||
|
||||
|
||||
Alternatively, you can use `get` but it may not be as convenient. First, you need to find an `id` of the client you're interested in - use `get`
|
||||
to list available clients, for example:
|
||||
|
||||
$ kcadm.sh get clients -r demorealm --fields id,clientId
|
||||
|
||||
Then use client's `id` attribute to construct an endpoint uri for listing client roles - `clients/ID/roles`.
|
||||
|
||||
For example:
|
||||
|
||||
$ kcadm.sh get clients/a95b6af3-0bdc-4878-ae2e-6d61a4eca9a0/roles -r demorealm
|
||||
|
||||
|
||||
|
||||
Getting a specific realm role::
|
||||
|
||||
|
@ -481,7 +469,7 @@ Alternatively, use special `get-roles` command, passing it role `name` (via `--r
|
|||
|
||||
For example:
|
||||
|
||||
$ kcadm.sh get-role -r demorealm --rolename user
|
||||
$ kcadm.sh get-roles -r demorealm --rolename user
|
||||
|
||||
|
||||
|
||||
|
@ -495,15 +483,6 @@ For example:
|
|||
$ kcadm.sh get-roles -r demorealm --cclientid realm-management --rolename manage-clients
|
||||
|
||||
|
||||
Alternatively, use client's `id`, and role `name` to construct an endpoint uri for a specific client role - `clients/ID/roles/ROLE_NAME`
|
||||
|
||||
For example:
|
||||
|
||||
$ kcadm.sh get clients/a95b6af3-0bdc-4878-ae2e-6d61a4eca9a0/roles/editor -r demorealm
|
||||
|
||||
Where `editor` is the `name` of the role we're interested in.
|
||||
|
||||
|
||||
Updating a realm role::
|
||||
|
||||
Use `update` operation with the same endpoint uri as for getting a specific realm role. For example:
|
||||
|
@ -532,6 +511,94 @@ Use `delete` operation with the same endpoint uri as for getting a specific clie
|
|||
$ kcadm.sh delete clients/a95b6af3-0bdc-4878-ae2e-6d61a4eca9a0/roles/editor -r demorealm
|
||||
|
||||
|
||||
Listing assigned, available and effective realm roles for a composite role::
|
||||
|
||||
There is a dedicated `get-roles` command to simplify listing of both realm and client roles. It is an extension of `get` command thus it behaves
|
||||
like `get` command with additional semantics for listing roles.
|
||||
|
||||
To list *assigned* realm roles for the composite role you can specify the target composite role by either `name` (via --rname option) or `id` (via --rid option).
|
||||
|
||||
For example:
|
||||
|
||||
$ kcadm.sh get-roles -r demorealm --rname testrole
|
||||
|
||||
|
||||
To list *effective* realm roles, use additional `--effective` option.
|
||||
|
||||
For example:
|
||||
|
||||
$ kcadm.sh get-roles -r demorealm --rname testrole --effective
|
||||
|
||||
|
||||
To list realm roles that can still be added to the composite role, use `--available` option instead.
|
||||
|
||||
For example:
|
||||
|
||||
$ kcadm.sh get-roles -r demorealm --rname testrole --available
|
||||
|
||||
|
||||
Listing assigned, available, and effective client roles for a composite role::
|
||||
|
||||
You can again use `get-roles` command to simplify listing of roles.
|
||||
|
||||
To list *assigned* client roles for the composite role you can specify the target composite role by either `name` (via --rname option)
|
||||
or `id` (via --rid option), and client by either `clientId` (via --cclientid option) or `id` (via --cid option).
|
||||
|
||||
For example:
|
||||
|
||||
$ kcadm.sh get-roles -r demorealm --rname testrole --cclientid realm-management
|
||||
|
||||
|
||||
To list *effective* realm roles, use additional `--effective` option.
|
||||
|
||||
For example:
|
||||
|
||||
$ kcadm.sh get-roles -r demorealm --rname testrole --cclientid realm-management --effective
|
||||
|
||||
|
||||
To list realm roles that can still be added to the target composite role, use `--available` option instead.
|
||||
|
||||
For example:
|
||||
|
||||
$ kcadm.sh get-roles -r demorealm --rname testrole --cclientid realm-management --available
|
||||
|
||||
|
||||
Adding realm roles to a composite role::
|
||||
|
||||
There is a dedicated `add-roles` command that can be used for adding both realm roles, and client roles.
|
||||
|
||||
For example, to add 'user' role to composite role 'testrole' :
|
||||
|
||||
$ kcadm.sh add-roles --rname testrole --rolename user -r demorealm
|
||||
|
||||
|
||||
Removing realm roles from a composite role::
|
||||
|
||||
There is a dedicated `remove-roles` command that can be used to remove both realm roles, and client roles.
|
||||
|
||||
For example, to remove 'user' role from target composite role 'testrole':
|
||||
|
||||
$ kcadm.sh remove-roles --rname testrole --rolename user -r demorealm
|
||||
|
||||
|
||||
Adding client roles to a composite role::
|
||||
|
||||
There is a dedicated `add-realm` operation that can be used for adding both realm roles, and client roles.
|
||||
|
||||
For example, to add to `testrole` composite role two roles defined on client `realm-management` - `create-client` role and `view-users` role:
|
||||
|
||||
$ kcadm.sh add-roles -r demorealm --rname testrole --cclientid realm-management --rolename create-client --rolename view-users
|
||||
|
||||
|
||||
Removing client roles from a composite role::
|
||||
|
||||
There is a dedicated `remove-realm` operation that can be used for removing both realm roles, and client roles.
|
||||
|
||||
For example, to remove from `testrole` composite role two roles defined on client `realm management` - `create-client` role and `view-users` role:
|
||||
|
||||
$ kcadm.sh remove-roles -r demorealm --rname testrole --cclientid realm-management --rolename create-client --rolename view-users
|
||||
|
||||
|
||||
=== Client operations
|
||||
|
||||
Creating a client::
|
||||
|
@ -612,7 +679,7 @@ It's also possible to filter users by `username`, `firstName`, `lastName`, or `e
|
|||
$ kcadm.sh get users -r demorealm -q email=google.com
|
||||
$ kcadm.sh get users -r demorealm -q username=testuser
|
||||
|
||||
Note that filtering doesn't use exact matching. For example, the above would match the value of `username` attribute against '*testuser*' pattern.
|
||||
Note that filtering doesn't use exact matching. For example, the above would match the value of `username` attribute against '\*testuser*' pattern.
|
||||
|
||||
You can also filter across multiple attributes by specifying multiple `-q` options, which would return only users
|
||||
that match condition for all the attributes.
|
||||
|
@ -692,30 +759,6 @@ For example:
|
|||
$ kcadm.sh get-roles -r demorealm --uusername testuser --available
|
||||
|
||||
|
||||
|
||||
Alternatively, you can also list roles by using `get` command.
|
||||
|
||||
To list *assigned* realm roles for the user use user's `id` to construct an endpoint uri - users/USER_ID/role-mappings/realm.
|
||||
|
||||
For example:
|
||||
|
||||
$ kcadm.sh get users/b544f379-5fc4-49e5-8a8d-5cfb71f46f53/role-mappings/realm
|
||||
|
||||
|
||||
To list *effective* realm roles, append `/composite` to the previous endpoint uri - users/USER_ID/role-mappings/realm/composite.
|
||||
|
||||
For example:
|
||||
|
||||
$ kcadm.sh get users/b544f379-5fc4-49e5-8a8d-5cfb71f46f53/role-mappings/realm/composite
|
||||
|
||||
To list realm roles that can still be added to the user, append `/available` instead - users/USER_ID/role-mappings/realm/available.
|
||||
|
||||
For example:
|
||||
|
||||
$ kcadm.sh get users/b544f379-5fc4-49e5-8a8d-5cfb71f46f53/role-mappings/realm/available
|
||||
|
||||
|
||||
|
||||
Listing assigned, available, and effective client roles for a user::
|
||||
|
||||
You can again use `get-roles` command to simplify listing of roles.
|
||||
|
@ -742,93 +785,31 @@ For example:
|
|||
$ kcadm.sh get-roles -r demorealm --uusername testuser --cclientid realm-management --available
|
||||
|
||||
|
||||
|
||||
Alternatively, you can also list roles by using `get` command.
|
||||
|
||||
To list *assigned* client roles for the user use user's `id` and client's `id` to construct an endpoint uri - users/USER_ID/role-mappings/clients/ID.
|
||||
|
||||
For example:
|
||||
|
||||
$ kcadm.sh get -r demorealm users/c9c73648-9af4-4394-bc01-1c4a98a5c52f/role-mappings/clients/70521f64-f3f2-4091-b2b6-9498a71fdaf5
|
||||
|
||||
To list *effective* client roles, append `/composite` to the previous endpoint uri - users/USER_ID/role-mappings/clients/ID/composite.
|
||||
|
||||
For example:
|
||||
|
||||
$ kcadm.sh get -r demorealm users/c9c73648-9af4-4394-bc01-1c4a98a5c52f/role-mappings/clients/70521f64-f3f2-4091-b2b6-9498a71fdaf5/composite
|
||||
|
||||
To list client roles that can still be added to the user, append `/available` instead - users/USER_ID/role-mappings/clients/ID/available.
|
||||
|
||||
For example:
|
||||
|
||||
$ kcadm.sh get -r demorealm users/c9c73648-9af4-4394-bc01-1c4a98a5c52f/role-mappings/clients/70521f64-f3f2-4091-b2b6-9498a71fdaf5/available
|
||||
|
||||
|
||||
|
||||
Adding realm roles to a user::
|
||||
|
||||
There is a dedicated `add-role` command that can be used for adding both realm roles, and client roles.
|
||||
There is a dedicated `add-roles` command that can be used for adding both realm roles, and client roles.
|
||||
|
||||
For example, to add 'user' role to user 'testuser' :
|
||||
|
||||
$ kcadm.sh add-role --username testuser --rolename user -r demorealm
|
||||
|
||||
Alternatively, to add a realm role to the user use user's `id` to construct an endpoint uri - `users/USER_ID/role-mapping/realm`
|
||||
|
||||
Then use `create` operation against that endpoint uri, and send it a list of JSON objects each representing a role to add,
|
||||
by having the same `id` attribute as any of available realm roles, and a matching `name` attribute:
|
||||
|
||||
$ kcadm.sh create users/c9c73648-9af4-4394-bc01-1c4a98a5c52f/role-mappings/realm -r demorealm -f - << EOF
|
||||
[{ "id": "63944125-1824-44cd-bb26-3eefa140e5b0", "name": "user"}]
|
||||
EOF
|
||||
|
||||
Or on Windows:
|
||||
|
||||
c:\> echo [{ "id": "63944125-1824-44cd-bb26-3eefa140e5b0", "name": "user"}] | create users/c9c73648-9af4-4394-bc01-1c4a98a5c52f/role-mappings/realm -r demorealm -f -
|
||||
$ kcadm.sh add-roles --username testuser --rolename user -r demorealm
|
||||
|
||||
|
||||
Removing realm roles from a user::
|
||||
|
||||
There is a dedicated `remove-role` command that can be used to remove both realm roles, and client roles.
|
||||
There is a dedicated `remove-roles` command that can be used to remove both realm roles, and client roles.
|
||||
|
||||
For example, to remove 'user' role from user 'testuser':
|
||||
|
||||
$ kcadm.sh remove-role --username testuser --rolename user -r demorealm
|
||||
$ kcadm.sh remove-roles --username testuser --rolename user -r demorealm
|
||||
|
||||
|
||||
Alternatively, to remove realm roles from the user use user's `id` to construct the same endpoint uri as for adding roles - `users/USER_ID/role-mapping/realm`
|
||||
|
||||
Then use `delete` operation rather than `create` against that endpoint uri, and send it a list of JSON objects each representing a role to add,
|
||||
by having the same `id` attribute as any of current realm roles, and a matching `name` attribute:
|
||||
|
||||
$ kcadm.sh delete users/c9c73648-9af4-4394-bc01-1c4a98a5c52f/role-mappings/realm -r demorealm -f - << EOF
|
||||
[{ "id": "63944125-1824-44cd-bb26-3eefa140e5b0", "name": "user"}]
|
||||
EOF
|
||||
|
||||
Or on Windows:
|
||||
|
||||
c:\> echo [{ "id": "63944125-1824-44cd-bb26-3eefa140e5b0", "name": "user"}] | delete users/c9c73648-9af4-4394-bc01-1c4a98a5c52f/role-mappings/realm -r demorealm -f -
|
||||
|
||||
Adding client roles to a user::
|
||||
|
||||
There is a dedicated `add-realm` operation that can be used for adding both realm roles, and client roles.
|
||||
|
||||
For example, to add to user `testuser` two roles defined on client `realm management` - `create-client` role and `view-users` role:
|
||||
|
||||
$ kcadm.sh add-role -r demorealm --uusername testuser --cclientid realm-management --rolename create-client --rolename view-users
|
||||
|
||||
|
||||
Alternatively, to add a client role to the user, use user's `id` and client's `id` to construct an endpoint uri - `users/USER_ID/role-mapping/clients/ID`
|
||||
|
||||
Then use `create` operation against that endpoint uri and send it a list of JSON objects each representing a role to add,
|
||||
by having the same `id` attribute as any of available client roles, and a matching `name` attribute:
|
||||
|
||||
$ kcadm.sh create users/c9c73648-9af4-4394-bc01-1c4a98a5c52f/role-mappings/clients/70521f64-f3f2-4091-b2b6-9498a71fdaf5 -r demorealm -f - << EOF
|
||||
[
|
||||
{ "id": "12f80d1c-c861-4056-ac6b-27276e2966ec", "name": "create-client"},
|
||||
{ "id": "ce2e4694-1c9c-40f8-a0af-dea32a9984dc", "name": "view-users"}
|
||||
]
|
||||
EOF
|
||||
$ kcadm.sh add-roles -r demorealm --uusername testuser --cclientid realm-management --rolename create-client --rolename view-users
|
||||
|
||||
|
||||
Removing client roles from a user::
|
||||
|
@ -837,20 +818,7 @@ There is a dedicated `remove-realm` operation that can be used for removing both
|
|||
|
||||
For example, to remove from user `testuser` two roles defined on client `realm management` - `create-client` role and `view-users` role:
|
||||
|
||||
$ kcadm.sh remove-role -r demorealm --uusername testuser --cclientid realm-management --rolename create-client --rolename view-users
|
||||
|
||||
|
||||
Alternatively, to remove client roles from the user use user's `id` and client's `id` to construct the same endpoint uri as for adding client roles - `users/USER_ID/role-mapping/clients/ID`
|
||||
|
||||
Then use `delete` operation rather than `create` against that endpoint uri, and send it a list of JSON objects each representing a role to add,
|
||||
by having the same `id` attribute as any of current client roles, and a matching `name` attribute:
|
||||
|
||||
$ kcadm.sh delete users/c9c73648-9af4-4394-bc01-1c4a98a5c52f/role-mappings/clients/70521f64-f3f2-4091-b2b6-9498a71fdaf5 -r demorealm -f - << EOF
|
||||
[
|
||||
{ "id": "12f80d1c-c861-4056-ac6b-27276e2966ec", "name": "create-client"},
|
||||
{ "id": "ce2e4694-1c9c-40f8-a0af-dea32a9984dc", "name": "view-users"}
|
||||
]
|
||||
EOF
|
||||
$ kcadm.sh remove-roles -r demorealm --uusername testuser --cclientid realm-management --rolename create-client --rolename view-users
|
||||
|
||||
|
||||
Listing user's sessions::
|
||||
|
@ -925,6 +893,24 @@ Use `delete` operation with the same endpoint uri as for getting a specific grou
|
|||
$ kcadm.sh delete groups/51204821-0580-46db-8f2d-27106c6b5ded -r demorealm
|
||||
|
||||
|
||||
Creating a sub-group::
|
||||
|
||||
Find 'id' of the parent group - by listing groups for example. Use that `id` to construct an endpoint uri - groups/GROUP_ID/children:
|
||||
|
||||
For example:
|
||||
|
||||
$ kcadm.sh create groups/51204821-0580-46db-8f2d-27106c6b5ded/children -r demorealm -s name=SubGroup
|
||||
|
||||
|
||||
Moving a group under another group::
|
||||
|
||||
Find 'id' of existing parent group, and of existing child group. Use parent group's `id` to construct and endpoint uri - groups/PARENT_GROUP_ID/children.
|
||||
|
||||
Make 'create' operation against this endpoint, and pass child group `id` as JSON body. For example:
|
||||
|
||||
$ kcadm.sh create groups/51204821-0580-46db-8f2d-27106c6b5ded/children -r demorealm -s id=08d410c6-d585-4059-bb07-54dcb92c5094
|
||||
|
||||
|
||||
Get groups for specific user::
|
||||
|
||||
To get user's membership in groups, use user's `id` to compose a resource URI - `users/USER_ID/groups`
|
||||
|
@ -980,30 +966,6 @@ For example:
|
|||
$ kcadm.sh get-roles -r demorealm --gname Group --available
|
||||
|
||||
|
||||
|
||||
Alternatively, you can also list roles by using `get` command.
|
||||
|
||||
To list *assigned* realm roles for the group use group's `id` to construct an endpoint uri - `groups/GROUP_ID/role-mappings/realm`.
|
||||
|
||||
For example:
|
||||
|
||||
$ kcadm.sh get groups/914e0cae-cae7-457a-bdf8-41eb92b6a94e/role-mappings/realm
|
||||
|
||||
|
||||
To list *effective* realm roles, append `/composite` to the previous endpoint uri - `groups/GROUP_ID/role-mappings/realm/composite`.
|
||||
|
||||
For example:
|
||||
|
||||
$ kcadm.sh get groups/914e0cae-cae7-457a-bdf8-41eb92b6a94e/role-mappings/realm/composite
|
||||
|
||||
To list realm roles that can still be added to the group, append `/available` instead - `groups/GROUP_ID/role-mappings/realm/available`.
|
||||
|
||||
For example:
|
||||
|
||||
$ kcadm.sh get groups/914e0cae-cae7-457a-bdf8-41eb92b6a94e/role-mappings/realm/available
|
||||
|
||||
|
||||
|
||||
Listing assigned, available, and effective client roles for a group::
|
||||
|
||||
A dedicated 'get-roles' command can be used to list for both realm roles and client roles.
|
||||
|
@ -1030,30 +992,6 @@ For example:
|
|||
$ kcadm.sh get-roles -r demorealm --gname Group --cclientid realm-management --available
|
||||
|
||||
|
||||
|
||||
Alternatively, you can also list roles by using `get` command.
|
||||
|
||||
To list *assigned* client roles for the group use group's `id` and client's `id` to construct an endpoint uri - `groups/GROUP_ID/role-mappings/clients/ID`.
|
||||
|
||||
For example:
|
||||
|
||||
$ kcadm.sh get -r demorealm groups/914e0cae-cae7-457a-bdf8-41eb92b6a94e/role-mappings/clients/70521f64-f3f2-4091-b2b6-9498a71fdaf5
|
||||
|
||||
To list *effective* client roles, append `/composite` to the previous endpoint uri - `groups/GROUP_ID/role-mappings/clients/ID/composite`.
|
||||
|
||||
For example:
|
||||
|
||||
$ kcadm.sh get -r demorealm groups/914e0cae-cae7-457a-bdf8-41eb92b6a94e/role-mappings/clients/70521f64-f3f2-4091-b2b6-9498a71fdaf5/composite
|
||||
|
||||
To list client roles that can still be added to the user, append `/available` instead - `groups/GROUP_ID/role-mappings/clients/ID/available`.
|
||||
|
||||
For example:
|
||||
|
||||
$ kcadm.sh get -r demorealm groups/914e0cae-cae7-457a-bdf8-41eb92b6a94e/role-mappings/clients/70521f64-f3f2-4091-b2b6-9498a71fdaf5/available
|
||||
|
||||
|
||||
|
||||
|
||||
=== Identity Providers operations
|
||||
|
||||
|
||||
|
@ -1227,7 +1165,7 @@ Perform `get` operation against `testLDAPConnection` endpoint. Provide query par
|
|||
|
||||
For example:
|
||||
|
||||
$ kcadm.sh get testLDAPConnection --filter action=testConnection --filter bindCredential=secret --filter bindDn=uid=admin,ou=system --filter connectionUrl=ldap://localhost:10389 --filter useTruststoreSpi=ldapsOnly
|
||||
$ kcadm.sh get testLDAPConnection -q action=testConnection -q bindCredential=secret -q bindDn=uid=admin,ou=system -q connectionUrl=ldap://localhost:10389 -q useTruststoreSpi=ldapsOnly
|
||||
|
||||
|
||||
Test LDAP user storage authentication::
|
||||
|
@ -1236,7 +1174,7 @@ Perform `get` operation against `testLDAPConnection` endpoint. Provide query par
|
|||
|
||||
For example:
|
||||
|
||||
$ kcadm.sh get testLDAPConnection --filter action=testAuthentication --filter bindCredential=secret --filter bindDn=uid=admin,ou=system --filter connectionUrl=ldap://localhost:10389 --filter useTruststoreSpi=ldapsOnly
|
||||
$ kcadm.sh get testLDAPConnection -q action=testAuthentication -q bindCredential=secret -q bindDn=uid=admin,ou=system -q connectionUrl=ldap://localhost:10389 -q useTruststoreSpi=ldapsOnly
|
||||
|
||||
|
||||
|
||||
|
@ -1269,7 +1207,7 @@ Set `providerId` attribute to `user-attribute-ldap-mapper`.
|
|||
|
||||
For example:
|
||||
|
||||
$ kcadm.sh create components -r demorealm -s name=user-attribute-ldap-mapper -s providerId=user-attribute-ldap-mapper -s providerType=org.keycloak.storage.ldap.mappers.LDAPStorageMapper -s parentId=b7c63d02-b62a-4fc1-977c-947d6a09e1ea -s 'config.user.model.attribute=["email"]' -s 'config.ldap.attribute=["mail"]' -s 'config.read.only=["false"]' -s 'config.always.read.value.from.ldap=["false"]' -s 'config.is.mandatory.in.ldap=["false"]'
|
||||
$ kcadm.sh create components -r demorealm -s name=user-attribute-ldap-mapper -s providerId=user-attribute-ldap-mapper -s providerType=org.keycloak.storage.ldap.mappers.LDAPStorageMapper -s parentId=b7c63d02-b62a-4fc1-977c-947d6a09e1ea -s 'config."user.model.attribute"=["email"]' -s 'config."ldap.attribute"=["mail"]' -s 'config."read.only"=["false"]' -s 'config."always.read.value.from.ldap"=["false"]' -s 'config."is.mandatory.in.ldap"=["false"]'
|
||||
|
||||
|
||||
Adding a group LDAP mapper::
|
||||
|
@ -1279,7 +1217,7 @@ Set `providerId` attribute to `group-ldap-mapper`.
|
|||
|
||||
For example:
|
||||
|
||||
$ kcadm.sh create components -r demorealm -s name=group-ldap-mapper -s providerId=group-ldap-mapper -s providerType=org.keycloak.storage.ldap.mappers.LDAPStorageMapper -s parentId=b7c63d02-b62a-4fc1-977c-947d6a09e1ea -s config.groups.dn=[] -s 'config.group.name.ldap.attribute=["cn"]' -s 'config.group.object.classes=["groupOfNames"]' -s 'config.preserve.group.inheritance=["true"]' -s 'config.membership.ldap.attribute=["member"]' -s 'config.membership.attribute.type=["DN"]' -s 'config.groups.ldap.filter=[]' -s 'config.mode=["LDAP_ONLY"]' -s 'config.user.roles.retrieve.strategy=["LOAD_GROUPS_BY_MEMBER_ATTRIBUTE"]' -s 'config.mapped.group.attributes=["admins-group"]' -s 'config.drop.non.existing.groups.during.sync=["false"]' -s 'config.roles=["admins"]' -s 'config.groups=["admins-group"]' -s 'config.group=[]' -s 'config.preserve=["true"]' -s 'config.membership=["member"]'
|
||||
$ kcadm.sh create components -r demorealm -s name=group-ldap-mapper -s providerId=group-ldap-mapper -s providerType=org.keycloak.storage.ldap.mappers.LDAPStorageMapper -s parentId=b7c63d02-b62a-4fc1-977c-947d6a09e1ea -s 'config."groups.dn"=[]' -s 'config."group.name.ldap.attribute"=["cn"]' -s 'config."group.object.classes"=["groupOfNames"]' -s 'config."preserve.group.inheritance"=["true"]' -s 'config."membership.ldap.attribute"=["member"]' -s 'config."membership.attribute.type"=["DN"]' -s 'config."groups.ldap.filter"=[]' -s 'config.mode=["LDAP_ONLY"]' -s 'config."user.roles.retrieve.strategy"=["LOAD_GROUPS_BY_MEMBER_ATTRIBUTE"]' -s 'config."mapped.group.attributes"=["admins-group"]' -s 'config."drop.non.existing.groups.during.sync"=["false"]' -s 'config.roles=["admins"]' -s 'config.groups=["admins-group"]' -s 'config.group=[]' -s 'config.preserve=["true"]' -s 'config.membership=["member"]'
|
||||
|
||||
|
||||
Adding a full name LDAP mapper::
|
||||
|
@ -1289,7 +1227,7 @@ Set `providerId` attribute to `full-name-ldap-mapper`.
|
|||
|
||||
For example:
|
||||
|
||||
$ kcadm.sh create components -r demorealm -s name=full-name-ldap-mapper -s providerId=full-name-ldap-mapper -s providerType=org.keycloak.storage.ldap.mappers.LDAPStorageMapper -s parentId=b7c63d02-b62a-4fc1-977c-947d6a09e1ea -s 'config.ldap.full.name.attribute=["cn"]' -s 'config.read.only=["false"]' -s 'config.write.only=["true"]'
|
||||
$ kcadm.sh create components -r demorealm -s name=full-name-ldap-mapper -s providerId=full-name-ldap-mapper -s providerType=org.keycloak.storage.ldap.mappers.LDAPStorageMapper -s parentId=b7c63d02-b62a-4fc1-977c-947d6a09e1ea -s 'config."ldap.full.name.attribute"=["cn"]' -s 'config."read.only"=["false"]' -s 'config."write.only"=["true"]'
|
||||
|
||||
|
||||
|
||||
|
|
Loading…
Reference in a new issue