Commit graph

22724 commits

Author SHA1 Message Date
aasingh
d769f0f711 Merge pull request #2 from keycloak/master
sync with latest changes
2016-06-06 16:20:24 +05:30
Stian Thorgersen
a5bd2c2651 Merge pull request #19 from stianst/master
Fix duplicated _jetty9_adapter_installation id
2016-06-06 12:40:41 +02:00
Stian Thorgersen
28a356b0ee Fix duplicated _jetty9_adapter_installation id 2016-06-06 12:39:57 +02:00
Pavel Drozd
54d9943a3b KEYCLOAK-3085 - Add module org.jboss.resteasy.resteasy-jaxrs to integration-arquillian-testsuite-providers 2016-06-06 11:51:20 +02:00
mposolda
1d47bb5af2 Kerberos example not available in product 2016-06-06 11:51:14 +02:00
Pavel Drozd
81de73df8e KEYCLOAK-3082 - clear queue before event 2016-06-06 11:46:39 +02:00
--add
03a4eeff8a sync with latest changes 2016-06-06 15:05:22 +05:30
--add
1347995f98 sync with latest changes 2016-06-06 14:55:35 +05:30
--add
1167bb6c1f sync with latest changes 2016-06-06 14:46:28 +05:30
Stian Thorgersen
f2fd7aad5b Merge pull request #18 from stianst/master
Fix links
2016-06-06 11:14:08 +02:00
Stian Thorgersen
1321ee91a4 Fix links 2016-06-06 11:13:45 +02:00
Stian Thorgersen
163974a212 Merge pull request #17 from stianst/master
Remove mod_auth_openidc in prod docs
2016-06-06 11:03:49 +02:00
Stian Thorgersen
3784f8423b Remove mod_auth_openidc in prod docs 2016-06-06 11:03:21 +02:00
Stian Thorgersen
f02af9b6d9 Merge pull request #12 from thomasdarimont/issue/11-document-integration-with-mod-auth-openidc
Fix #11: Document integration with Apache module mod_auth_openidc
2016-06-06 11:02:07 +02:00
Stian Thorgersen
fec9863fdd Merge pull request #16 from stianst/master
Added generic OIDC chapter
2016-06-06 11:01:16 +02:00
Stian Thorgersen
d16bf61846 Added generic OIDC chapter 2016-06-06 11:00:44 +02:00
mposolda
1c8ed6c0b8 Fix note about 'View all users' 2016-06-06 10:57:41 +02:00
Thomas Darimont
e9241f8c1d Fix #11: Document integration with Apache module mod_auth_openidc 2016-06-06 10:22:23 +02:00
Thomas Darimont
51312ff7ff KEYCLOAK-2891: Fix label alignment for OIDC Endpoint link.
This probably happend during merge.
2016-06-06 09:55:31 +02:00
Pedro Igor
59341c6b32 Merge pull request #7 from pedroigor/master
More doc
2016-06-05 19:18:00 -03:00
Pedro Igor
3c0d6608b6 More doc 2016-06-05 19:17:31 -03:00
Stan Silvert
2c3b276f8d Minor changes to identity brokering chapter. 2016-06-05 17:23:11 -04:00
Bill Burke
b2d8c6bca2 Merge pull request #2418 from schmeedy/master
Fix k_query_bearer_token endpoint in proxy
2016-06-05 11:20:08 -04:00
Bill Burke
4c9a0b45d4 Merge pull request #2229 from thomasdarimont/issue/KEYCLOAK-2489-script-based-authenticator-definitions
KEYCLOAK-2489 - Add support for Script-based AuthenticationExecution definitions.
2016-06-05 11:12:05 -04:00
Bill Burke
b3f3449e39 Merge pull request #2810 from thomasdarimont/issue/KEYCLOAK-2974-handle-ModelException-in-UsersResource
KEYCLOAK-2974: Handle ModelException in UsersResource
2016-06-05 11:06:32 -04:00
Bill Burke
a76a4730e3 Merge pull request #2884 from thomasdarimont/issue/KEYCLOAK-2891-link-to-oidc-endpoints-from-admin-console
KEYCLOAK-2891: Add link to OpenID Endpoint Configuration to realm details page.
2016-06-05 11:06:11 -04:00
Bill Burke
dbeb3353f8 Merge pull request #2911 from thomasdarimont/issue/KEYCLOAK-3081-oidc-support-user-role-mapper
KEYCLOAK-3081: Add client mappers to map user roles to token
2016-06-05 11:03:47 -04:00
Pedro Igor
3e5a6a9281 Merge pull request #6 from pedroigor/master
Servlet security quickstart
2016-06-03 20:49:58 -03:00
Pedro Igor
62324b95d1 Servlet security quickstart 2016-06-03 20:49:26 -03:00
Bill Burke
faaf1460b1 Merge pull request #10 from mposolda/master
More Fuse adapter documentation. Remove references to Apache Karaf
2016-06-03 16:15:19 -04:00
Bill Burke
c5d6b3c692 Merge pull request #8 from mposolda/master
Remove redundant note
2016-06-03 16:14:54 -04:00
Bill Burke
306ed24ad4 Merge pull request #16 from ssilvert/roles-chapter
Minor changes for roles chapter.
2016-06-03 16:14:17 -04:00
Bill Burke
05f2b54b5f Merge pull request #17 from ssilvert/groups-chapter
Minor changes to groups chapter.
2016-06-03 16:13:52 -04:00
Bill Burke
4bfc50396a Merge pull request #18 from ssilvert/admin-access-control-chapter
Minor changes to admin console permissions chapter.
2016-06-03 16:13:14 -04:00
Stan Silvert
a6f9e3f1cd Minor changes to admin console permissions chapter. 2016-06-03 14:52:04 -04:00
mposolda
ded3775fc6 Revert redundant note as it's not needed anymore 2016-06-03 20:36:20 +02:00
mposolda
02e0a8b362 Update .gitignore like in other guides 2016-06-03 20:36:20 +02:00
Stan Silvert
db0b530832 Minor changes to groups chapter. 2016-06-03 14:16:15 -04:00
Stan Silvert
ced599075d Minor changes for roles chapter. 2016-06-03 14:07:00 -04:00
mposolda
515f3c9002 More Fuse adapter documentation. Remove references to Apache Karaf 2016-06-03 19:00:19 +02:00
Bill Burke
87f784f6d1 fixes 2016-06-03 10:36:51 -04:00
Bill Burke
7f4ac37258 fixes 2016-06-03 10:15:36 -04:00
Bill Burke
997de367af fixes 2016-06-03 10:13:57 -04:00
Bill Burke
22597cd536 Merge pull request #15 from ssilvert/clients-chapter
SSO Protocols chapter and Clients chapter
2016-06-03 10:13:43 -04:00
Bill Burke
3ecee7ead1 Merge branch 'master' of github.com:keycloak/server_installation_guide 2016-06-03 09:56:50 -04:00
Bill Burke
572fdb6199 fix 2016-06-03 09:56:47 -04:00
Thomas Darimont
a2d1c8313d KEYCLOAK-3081: Add client mapper to map user roles to token
Introduced two new client protocol mappers to propagate assigned user client / realm roles to a JWT ID/Access Token.
Each protocol mapper supports to use a prefix string that is prepended to each role name.

 The client role protocol mapper can specify from which client the roles should be considered.
 Composite Roles are resolved recursively.

Background:
Some OpenID Connect integrations like mod_auth_openidc don't support analyzing deeply nested or encoded structures.
In those scenarios it is helpful to be able to define custom client protocol mappers that allow to propagate a users's roles as a flat structure
(e.g. comma separated list) as a top-level  (ID/Access) Token attribute that can easily be matched with a regex.

In order to differentiate between client specific roles and realm roles it is possible to configure
both separately to be able to use the same role names with different contexts rendered as separate token attributes.
2016-06-03 15:52:58 +02:00
--add
bda4e117f9 corrections as per review comments 2016-06-03 18:55:19 +05:30
Stan Silvert
c02c169146 Minor changes for Clients chapter. 2016-06-03 09:12:50 -04:00
Stan Silvert
be0c701875 Minor changes for SSO Protocols chapter. 2016-06-03 09:12:49 -04:00