KEYCLOAK-5846
This commit is contained in:
parent
33111f60a6
commit
f5b06b1370
3 changed files with 62 additions and 22 deletions
24
upgrading/topics/rhsso/changes-71.adoc
Normal file
24
upgrading/topics/rhsso/changes-71.adoc
Normal file
|
@ -0,0 +1,24 @@
|
|||
== RH-SSO 7.1
|
||||
|
||||
The following changes have occurred from RH-SSO 7.0 to RH-SSO 7.1.
|
||||
|
||||
=== Realm Keys
|
||||
For RH-SSO 7.0, only one set of keys could be associated with a realm. This meant that when changing the keys, all current cookies and tokens would be invalidated and all users would have to re-authenticate. For RH-SSO 7.1, support for multiple keys for one realm has been added. At any given time, one set of keys is the active set used for creating signatures, but there can be multiple keys used to verify signatures. This means that old cookies and tokens can be verified, then refreshed with the new signatures, allowing users to remain authenticated when keys are changed. There are also some changes to how keys are managed through the Admin Console and Admin REST API; for more details see link:{adminguide_link}#realm_keys[Realm Keys] in the {adminguide_name}.
|
||||
|
||||
To allow seamless key rotation you must remove hard-coded keys from client adapters. The client adapters will automatically retrieve keys from the server as long as the realm key is not specified. Client adapters will also retrieve new keys automatically when keys are rotated.
|
||||
|
||||
=== Client Redirect URI Matching
|
||||
For RH-SSO 7.0, query parameters are ignored when matching valid redirect URIs for a client. For RH-SSO 7.1, query parameters are no longer ignored. If you need to include query parameters in the redirect URI you must specify the query parameters in the valid redirect URI for the client (for example, \https://hostname/app/login?foo=bar) or use a wildcard (for example, \https://hostname/app/login/*). Fragments are also no longer permitted in Valid Redirect URIs (that is, \https://hostname/app#fragment).
|
||||
|
||||
=== Automatically Redirect to Identity Provider
|
||||
For RH-SSO 7.1, identity providers cannot be set as the default authentication provider. To automatically redirect to an identity provider for RH-SSO 7.1, you must now configure the identity provider redirector. For more information see link:{adminguide_link}#default_identity_provider[Default Identity Provider] in the _{adminguide_name}_. If you previously had an identity provider with the default authentication provider option set, this value is automatically used as the value for the identity provider redirector when the server is upgraded to RH-SSO 7.1.
|
||||
|
||||
=== Admin REST API
|
||||
For RH-SSO 7.0, paginated endpoints in the Admin REST API return all results if the maxResults query parameter was not specified. This could cause issues with a temporary high load and requests timing out when a large number of results were returned (for example, users). For RH-SSO 7.1, a maximum of 100 results are returned if a value for maxResults is not specified. You can return all results by specifying maxResults as -1.
|
||||
|
||||
=== Server Configuration
|
||||
For RH-SSO 7.0, server configuration is split between the keycloak-server.json file and the standalone/domain.xml or domain.xml file. For RH-SSO 7.1, the keycloak-server.json file has been removed and all server configuration is done through the standalone.xml or domain.xml file. The upgrading procedure for RH-SSO 7.1 automatically migrates the server configuration from the keycloak-server.json file to the standalone.xml or domain.xml file.
|
||||
|
||||
=== Key Encryption Algorithm in SAML Assertions
|
||||
For RH-SSO 7.1, keys in SAML assertions and documents are now encrypted using the RSA-OAEP encryption scheme. To use encrypted assertions, ensure your service providers support this encryption scheme. In the event that you have service providers that do not support RSA-OAEP, RH-SSO can be configured to use the legacy RSA-v1.5 encryption scheme by starting the server with the system property “keycloak.saml.key_trans.rsa_v1.5” set to true. If you do this, you should upgrade your service providers as soon as possible to be able to revert to the more secure RSA-OAEP encryption scheme.
|
||||
|
34
upgrading/topics/rhsso/changes-72.adoc
Normal file
34
upgrading/topics/rhsso/changes-72.adoc
Normal file
|
@ -0,0 +1,34 @@
|
|||
== RH-SSO 7.2
|
||||
|
||||
The following changes have occurred from RH-SSO 7.1 to RH-SSO 7.2.
|
||||
|
||||
=== New Password Hashing algorithms
|
||||
|
||||
We have added two new password hashing algorithms (pbkdf2-sha256 and pbkdf2-sha512). New realms will use the pbkdf2-sha256
|
||||
hashing algorithm with 27500 hashing iterations. Since pbkdf2-sha256 is slightly faster than pbkdf2 the iterations was
|
||||
increased to 27500 from 20000.
|
||||
|
||||
Existing realms are upgraded if the password policy contains the default value for the hashing algorithm (not specified) and
|
||||
iteration (20000). If you have changed the hashing iterations, you need to manually change to pbkdf2-sha256 if you'd like
|
||||
to use the more secure hashing algorithm.
|
||||
|
||||
=== ID Token requires scope=openid
|
||||
|
||||
In RH-SSO 7.0, the ID Token was returned regardless if `scope=openid` query parameter was present or not in authorization
|
||||
request. This is incorrect according to the OpenID Connect specification.
|
||||
|
||||
In RH-SSO 7.1, we added this query parameter to adapters, but left the old behavior to accommodate migration.
|
||||
|
||||
In RH-SSO 7.2, this behavior has changed and the `scope=openid` query parameter is now required to mark the request as an
|
||||
OpenID Connect request. If this query parameter is omitted the ID Token will not be generated.
|
||||
|
||||
=== Microsoft SQL Server requires extra dependency
|
||||
|
||||
Microsoft JDBC Driver 6.0 requires additional dependency added to the JDBC driver module. If you observe an
|
||||
`NoClassDefFoundError` error when using Microsoft SQL Server please add the following dependency to your JDBC driver
|
||||
`module.xml` file:
|
||||
|
||||
[source,xml]
|
||||
----
|
||||
<module name="javax.xml.bind.api"/>
|
||||
----
|
|
@ -1,24 +1,6 @@
|
|||
== About Changes from RH-SSO 7.0 to RH-SSO 7.1
|
||||
== Changes
|
||||
|
||||
The following changes have occurred from RH-SSO 7.0 to RH-SSO 7.1. Review these changes carefully before upgrading.
|
||||
|
||||
=== Realm Keys
|
||||
For RH-SSO 7.0 only one set of keys could be associated with a realm. This meant that when changing the keys all current cookies and tokens would be invalidated and all users would have to re-authenticate. For RH-SSO 7.1 support for multiple keys for one realm has been added. At any given time one set of keys is the active keys used for signatures, but there can be multiple keys used to verify signatures. This means that old cookies and tokens can be verified, then refreshed with the new signatures, allowing users to remain authenticated when keys are changed. There are also some changes to how keys are managed through the Admin Console and Admin REST API; for more details see link:{adminguide_link}#realm_keys[Realm Keys] in the _{adminguide_name}_.
|
||||
|
||||
To allow seamless key rotation you must remove hard-coded keys from client adapters. The client adapters will automatically retrieve keys from the server as long as the realm key is not specified. Client adapters will also retrieve new keys automatically when keys are rotated.
|
||||
|
||||
=== Client Redirect URI Matching
|
||||
For RH-SSO 7.0 query parameters are ignored when matching valid redirect URIs for a client. For RH-SSO 7.1 query parameters are no longer ignored. If you need to include query parameters in the redirect URI you must specify the query parameters in the valid redirect URI for the client (for example, \https://hostname/app/login?foo=bar) or use a wildcard (for example, \https://hostname/app/login/*). Fragments are also no longer permitted in Valid Redirect URIs (that is, \https://hostname/app#fragment).
|
||||
|
||||
=== Automatically Redirect to Identity Provider
|
||||
For RH-SSO 7.1, identity providers cannot be set as the default authentication provider. To automatically redirect to an identity provider for RH-SSO 7.1 you must now configure the identity provider redirector. For more information see link:{adminguide_link}#default_identity_provider[Default Identity Provider] in the _{adminguide_name}_. If you previously had an identity provider with the default authentication provider option set, this value is automatically used as the value for the identity provider redirector when the server is upgraded to RH-SSO 7.1.
|
||||
|
||||
=== Admin REST API
|
||||
For RH-SSO 7.0 paginated endpoints in the Admin REST API return all results if the maxResults query parameter was not specified. This could cause issues with a temporary high load and requests timing out when a large number of results were returned (for example, users). For RH-SSO 7.1 a maximum of 100 results are returned if a value for maxResults is not specified. You can return all results by specifying maxResults as -1.
|
||||
|
||||
=== Server Configuration
|
||||
For RH-SSO 7.0 server configuration is split between the keycloak-server.json file and the standalone/domain.xml or domain.xml file. For RH-SSO 7.1 the keycloak-server.json file has been removed and all server configuration is done through the standalone.xml or domain.xml file. The upgrading procedure for RH-SSO 7.1 automatically migrates the server configuration from the keycloak-server.json file to the standalone.xml or domain.xml file.
|
||||
|
||||
=== Key Encryption Algorithm in SAML Assertions
|
||||
For RH-SSO 7.1, keys in SAML assertions and documents are now encrypted using the RSA-OAEP encryption scheme. To use encrypted assertions, ensure your service providers support this encryption scheme. In the event that you have service providers that do not support RSA-OAEP, RH-SSO can be configured to use the legacy RSA-v1.5 encryption scheme by starting the server with the system property “keycloak.saml.key_trans.rsa_v1.5” set to true. If you do this you should upgrade your service providers as soon as possible to be able to revert to the more secure RSA-OAEP encryption scheme.
|
||||
Review these changes carefully before upgrading.
|
||||
|
||||
include::changes-72.adoc[leveloffset=1]
|
||||
include::changes-71.adoc[leveloffset=1]
|
||||
|
|
Loading…
Reference in a new issue