Client adapter configuration was updated to support for customization
of HttpClient used for key retrieval similarly to OIDC. Further, it is
now possible to specify several static public keys for signature
verification in saml-client.xml.
Contrary to POST binding, signature of SAML protocol message sent using
REDIRECT binding is contained in query parameters and not in the
message. This renders <dsig:KeyName> key ID hint unusable. This commit
adds <Extensions> element in SAML protocol message containing key ID so
that key ID is present in the SAML protocol message.
Changes of SAML assertion creation/parsing that are required to allow
for validation of rotating realm key: signed SAML assertions and signed
SAML protocol message now contain signing key ID in XML <dsig:KeyName>
element.
KEYCLOAK-2550
Typo in userguide
KEYCLOAK-1928 Kerberos working with IBM JDK
KEYCLOAK-1928 Remove sun.jdk.jgss module
KEYCLOAK-1928 Fix kerberos with adapter on JDK7
KPR-147 - Initial login scenarios around admin password - test
KEYCLOAK-2561 Fix issues with blank password
KEYCLOAK-2559 Missing add/remove button for 'Valid Redirect URIs' in a client settings form
Added simple test for JPA performance (with many users).
Fixed "re-import" operation logging.
Fixed for Timer.saveData()
Fixed for Timer.saveData()
ManyUsersTest: ArrayList --> LinkedList
Fix AbstractUserTest
Fix parentheses in login page object
Add tests for IDP initiated login
KEYCLOAK-1040
Allow import of realm keys (like we do for SAML)
KEYCLOAK-2556 Remove required for client create root url and saml endpoint
KEYCLOAK-2555 ForbiddenException when importing test realm or creating test user
KEYCLOAK-2553
Unexpected form behavior while creating a client
KEYCLOAK-2551
Broken navigation links while creating/editing a Client Mapper