mposolda
a891a567a5
KEYCLOAK-13047 LDAP no-import fixes. Avoid lost updates - dont allow update attributes, which are not mapped to LDAP
2020-05-19 16:57:43 +02:00
Pedro Igor
68024396f1
[KEYCLOAK-11784] - Quarkus Extension
...
Co-authored-by: stianst <stianst@gmail.com>
2020-05-19 14:57:15 +02:00
Jared Jennings
91aaed6370
Update token-exchange.adoc
...
Token Exchange is no longer a draft, but an accepted RFC. Updated link to RFC.
2020-05-19 13:19:24 +02:00
Martin Kanis
6f43b58ccf
KEYCLOAK-14074 filterIdentityProviders compares providerId instead of alias
2020-05-19 09:46:21 +02:00
Kohei Tamura
0a4db5b3b5
KEYCLOAK-14227 Remove unnecessary double quotations
2020-05-19 09:44:45 +02:00
Thomas Darimont
6211fa90e0
KEYCLOAK-10932 Honor given_name and family_name in OIDC brokering
...
Previously firstname and lastname were derived from the name claim.
We now use direct mappings to extract firstname and lastname from
given_name and family_name claims.
Added test to KcOidcFirstBrokerLoginTest
Marked org.keycloak.broker.provider.BrokeredIdentityContext#setName
as deprecated to avoid breaking existing integrations.
2020-05-19 09:10:43 +02:00
stianst
d99d65eb92
KEYCLOAK-14163 Common resources are not loaded from common path
2020-05-18 15:08:34 +02:00
Thomas Darimont
87dd143452
KEYCLOAK-14178 Disable erroneous HTML escaping in ResteasyServlet configuration in KeycloakServer
...
- Removed duplicate servlet configuration: the HttpServlet30Dispatcher servlet is already configured by server.undertowDeployment(deployment, "");
- Disabled the HTML escaping in the ResteasyDeployment
2020-05-18 14:59:23 +02:00
Thomas Darimont
e11f1698e9
KEYCLOAK-14178 Avoid erroneous HTML escaping in KeycloakServer
...
This PR disables the Resteasy HTML Sanitizer in KeycloakServer.
Previously KeycloakTest server erroneously escapes html in error pages.
See the linked JIRA issue for details.
2020-05-18 14:59:23 +02:00
vramik
37e23cb0a2
KEYCLOAK-14062 Add postgres10
2020-05-18 13:36:18 +02:00
Stan Silvert
a827d20a90
KEYCLOAK-11201: Use snowpack instead of SystemJs.
...
Co-authored-by: Erik Jan de Wit <erikjan.dewit@gmail.com>
2020-05-15 08:58:26 +02:00
Tero Saarni
bf8316eefa
KEYCLOAK-14162 Uplifted Apache DS version for LDAPEmbeddedServer
...
Signed-off-by: Tero Saarni <tero.saarni@est.tech>
2020-05-14 13:06:25 +02:00
Pedro Igor
bae802bcfa
[KEYCLOAK-11784] - Using Hibernate Extension
2020-05-14 11:10:46 +02:00
Andy Munro
80c5c121a7
KEYCLOAK-14122 Correcting formatting in Cross-DC graphic.
2020-05-13 15:03:25 -03:00
stianst
8c9b7b05ac
KEYCLOAK-14135 Don't include built-in themes in themes directory of Quarkus dist
2020-05-13 09:04:33 -03:00
stianst
b04932ede5
KEYCLOAK-12414 Remove the need to specify defaults in config file
2020-05-13 09:02:29 -03:00
Pedro Igor
35f622f48e
[KEYCLOAK-11719] - Remove need for servlets/undertow from Quarkus dist
...
Co-authored-by: MatthewC <matthewc@backbase.com>
2020-05-13 09:28:58 +02:00
Álvaro Gómez Giménez
666832d1be
KEYCLOAK-13066 Include resourceType in ScopePermissionRepresentation
2020-05-12 17:11:35 -03:00
Sven-Torben Janus
82d3251ab4
Remove *-imports
2020-05-12 20:50:18 +02:00
Sven-Torben Janus
fcb0e450a0
KEYCLOAK-13817 Return local user from LDAPStorageProvider
2020-05-12 20:50:18 +02:00
Sven-Torben Janus
fed34929ae
KEYCLOAK-13817 Fix X509 auth fails
...
when attribute value is always read from LDAP and import is enabled
When userattribute value is always read from LDAP, then the value is not
available in the local store. Therfore, KC will not find a user by that
attribute in the local store. When querying the LDAP storage
provider, the user will be found. However, when it is also available in
the local store (though without the attribute) it will not get imported
and therefore not returned with the result set of the LDAP storage
provider. Hence, the user will not be found at all.
This change adds the user to the result set of the LDAP user stoage
provider, iff the attribute user by the search is set to always read
value from LDAP.
2020-05-12 20:50:18 +02:00
Yoshiyuki Tabata
f7d00fc2e9
KEYCLOAK-13844 "exp" claim should not be "0" when using offline token
2020-05-12 16:14:37 +02:00
Michael Cooney
3291161954
KEYCLOAK-13818: Addressing performance issues with adding client scopes during realm creation. Removing redundant lookups by passing all scopes that need to be created at once.
2020-05-12 15:59:42 +02:00
stianst
49db2c13a5
KEYCLOAK-8141 Fix issue where attribute values are duplicated if updates to user are done in parallell
2020-05-12 09:06:44 +02:00
stianst
73aff6d60e
KEYCLOAK-14117 Exclude rcue module in community
2020-05-12 08:58:11 +02:00
Neon Ngo
141eeb1f49
KEYCLOAK-13939 Remove unused mixed-case themes/.../rcue/.../git-Logo.svg
2020-05-11 12:06:07 +02:00
spurreiter
6332ed42c0
KEYCLOAK-13940 remove duplicated urlsafe decoding
2020-05-08 15:18:56 +02:00
Pedro Igor
44c49d69a7
[KEYCLOAK-13071] - AuthorizationTokenService swallows Exceptions thrown by KeycloakIdentity
2020-05-08 09:21:37 +02:00
vmuzikar
098ec91dd2
KEYCLOAK-12045 Improve UX for the Credentials tab in Admin Console
2020-05-07 14:14:54 -04:00
Charles-Eric Giraud
3ebfdb59ab
[KEYCLOAK-13854] Fixing client role creation with configure permission
2020-05-07 16:41:19 +02:00
Martin Kanis
157afd7bb1
KEYCLOAK-14081 Upgrade to Wildfly 19.1.0
2020-05-07 15:00:46 +02:00
Takashi Norimatsu
3716bd96ad
KEYCLOAK-14093 Specify Signature Algorithm in Signed JWT with Client Secret
2020-05-07 11:28:39 +02:00
Pedro Igor
c4a6f0830e
[KEYCLOAK-14076] - Authorization context not always considering scope when checking permission
2020-05-07 08:48:07 +02:00
Agniswar Mandal
8646d0668a
KEYCLOAK-14072 docker-compose.yaml file generated creates an invalid urls
...
* Updated Invalid URLs
The docker-compose.yaml file generated creates an invalid url for REGISTRY_AUTH_TOKEN_REALM and REGISTRY_AUTH_TOKEN_ISSUER. Fixed
* KEYCLOAK-14072 JIRA#14072
Test coverage fix for the the JIRA#14072
2020-05-07 08:40:52 +02:00
vramik
4a70494285
KEYCLOAK-14086 Outdated wildfly deprecated version
2020-05-07 08:39:18 +02:00
Stan Silvert
deead471a9
KEYCLOAK-12852: Internal query params not removed after AIA
2020-05-06 16:07:21 -03:00
Pedro Igor
19ab9ba53d
[KEYCLOAK-13829] - DML for DELETE is executed even though attribute does not exist
2020-05-06 14:04:06 +02:00
stianst
2be61246f4
KEYCLOAK-14057 Fix resource not found error when creating policy
2020-05-06 11:08:29 +02:00
Takashi Norimatsu
0d0617d44a
KEYCLOAK-13720 Specify Signature Algorithm in Signed JWT Client Authentication
2020-05-05 17:43:00 +02:00
rmartinc
f0852fd362
KEYCLOAK-13823: "Dir" Full export/import: On import, service account roles and authorization info are not imported
2020-05-05 17:05:56 +02:00
stianst
7c97c25ede
KEYCLOAK-14060 Update links to user ml
2020-05-05 13:50:49 +02:00
Razzi Abuissa
7885620967
Switch ${project.name}, which was not rendering, to {project_name}
2020-05-05 12:13:35 +02:00
Stian Thorgersen
4d64a08129
Update README.md
2020-05-05 12:09:44 +02:00
Stian Thorgersen
c1be9adcde
Create SECURITY.md
2020-05-05 12:09:44 +02:00
Vanrar68
85feda3beb
KEYCLOAK-13998 ConditionalRoleAuthenticator doesn't work with composite roles
2020-05-05 08:39:04 +02:00
Johann Schmitz
600fd83078
Remove impersonation button on user detail page if feature is disabled
...
The impersonation button in the user list is already removed when the impersonation feature is disabled. Remove the button from the detail page too.
2020-05-04 15:10:53 -04:00
Erik Jan de Wit
1f462a2ae2
KEYCLOAK-12916 add name or username in toolbar
...
Update testsuite/integration-arquillian/tests/other/base-ui/src/test/java/org/keycloak/testsuite/ui/account2/page/fragment/LoggedInPageHeader.java
Co-Authored-By: Václav Muzikář <vaclav@muzikari.cz>
Moved concatenation to messages_en.properties
fix: renamed loggedInUser to landingLoggedInUser
for the welcome page
moved `loggedInUserName` to WelcomePageScrips
2020-05-04 14:58:27 -04:00
Martin Bartos
7ebdca48d3
[KEYCLOAK-13572] Doesn't observe After events due to assume check
2020-05-04 17:31:44 +02:00
Michael Riedmann
66c7ec6b08
[KEYCLOAK-13995] added test for clientUpdate with ProtocolMappers
2020-05-04 17:13:57 +02:00
Michael Riedmann
b3a88d6509
[KEYCLOAK-13995] fixed ClientMappers update capabilities of Admin REST API endpoint.
2020-05-04 17:13:57 +02:00