Commit graph

1454 commits

Author SHA1 Message Date
wojnarfilip
f54cd969f8 OTPPolicyTest failures resolve
Tests pass locally, Closes #9692
2022-02-11 14:06:17 +01:00
Martin Bartoš
6c09ec6de6 Hide 'unknown' transport media type label for WebAuthn authenticators
Closes #10036
2022-02-11 08:28:50 +01:00
Benjamin MENANT
c54920fd0e
fix(themes/keycloak.v2): mixed tags in index.ftl (#9884)
- SVG spinner missed its closing tag
- spinner wrapper opened 1 div but closed 3
2022-02-09 08:32:13 -05:00
Jon Koops
90fe97133c
Unify package files for JS adapter (#9789) 2022-02-08 13:52:46 -05:00
Mauro de Wit
2c238b9f04
session-limiting-feature (#8260)
Closes #10077
2022-02-08 19:16:06 +01:00
alisonbruno97
d1b64f47fa
Update Portuguese (Brazil) translations #9892 (#9893) 2022-02-08 12:35:31 +01:00
Alexander Schwartz
100dbb8781
Rework escaping of special characters in message properties for account console (#9995)
Closes #9503
2022-02-07 14:47:03 -05:00
Martin Bartoš
5494848f3f Not possible to register webauthn key on Firefox
Closes #10020
2022-02-07 12:21:22 +01:00
Marek Posolda
d9c8cb30a5
Closes #9498 - Fix cases when user is forced to re-authenticate (#9580) 2022-02-07 09:02:08 +01:00
Martin Bartoš
d82122b982 Store information about transport media of WebAuthn authenticator
Closes #9800
2022-02-04 19:36:30 +01:00
Daniel Gozalo
3528e7ba54 [fixes #9224] - Get consented scopes from AuthorizationContext
Always show the consent screen when a dynamic scope is requested and show the requested parameter

Improve the code that handles dynamic scopes consent and add some log traces

Add a test to check how we show dynamic scope in the consent screen and added missing template file change

Fix merge problem in comment and improve other comments

Fix the Dynamic Scope test by assigning it to the client as optional instead of default

Change how dynamic scopes are represented in the consent screen and adapt test
2022-02-02 09:10:20 +01:00
Andreas Rühl
99213ab042
hardcoded string replaced with localization (#9543)
Co-authored-by: Andreas Ruehl <ar@asuar.de>
2022-01-31 15:15:32 -05:00
Andreas Ruehl
f11b049e52 Missing translation of webauthn-doAuthenticate added
closes #9424
2022-01-28 17:48:10 +01:00
Daniel Gozalo
4136bf7700 [fixes #9750] Make sure a Dynamic scope isn't assignable to a client as a default scope, and only show non-dynamic scopes in the available client scopes client menu 2022-01-26 13:32:04 +01:00
Christoph Leistert
e751626ac8
Closes #9418: Admin UI: sort the realm localization texts alphabetically (#9419) 2022-01-21 10:49:22 -05:00
Pedro Igor
4c747047ce
Backward compatibility for lower-case bearer type in token responses (#9538)
Closes #9537
2022-01-13 08:34:45 +01:00
Jon Koops
dea123169f
KEYCLOAK-14817 Allow JS adapter to be bundled as ES module (#9351) 2022-01-13 08:28:30 +01:00
Daniel Gozalo
8ea09d3816
[fixes #9222] - Let users configure Dynamic Client Scopes (#9327) 2022-01-12 14:27:24 +01:00
Yoshiyuki Tabata
1ff558bd9e Closes #9488 2022-01-12 09:06:48 +01:00
Martin Bartoš
8649ca3d50
Multiple active tabs when realm name equals name of the tab in Admin console (#9438)
Closes #9421
2022-01-11 16:01:28 -05:00
Martin Bartoš
d75d28468e
KEYCLOAK-19490 Add more details about 2FA to authenticate page (#9252)
Closes #9494
2022-01-11 09:16:22 +01:00
Yoshiyuki Tabata
baad104673
KEYCLOAK-18880 change "look ahead window" to "look around window" (#9341)
Closes #9340
2022-01-05 20:04:50 +01:00
CorneliaLahnsteiner
dff79cee3c
KEYCLOAK-847 Add support for step up authentication (#7897)
KEYCLOAK-847 Fix behavior of unknown not essential acr claim

Co-authored-by: Georg Romstorfer <georg.romstorfer@gmail.com>
Co-authored-by: Marek Posolda <mposolda@gmail.com>
2021-12-22 12:43:12 +01:00
Stian Thorgersen
3fe7a50b64
Add profile to include new admin console (#9283)
Closes #9279
2021-12-22 08:27:33 +01:00
Ben Tatham
f201760a4a Fixed #8892 "does not exists" language 2021-12-21 20:24:13 +01:00
Yoshiyuki Tabata
db60f56fe8
Translate the title of the login screen into Japanese (#9266) 2021-12-21 13:00:17 +01:00
stianst
c6e1ab2d56 Bump PAT used for admin-ui 2021-12-20 10:51:37 +01:00
keycloak-bot
9f3d4a7d42 Set version to 17.0.0-SNAPSHOT 2021-12-20 10:50:39 +01:00
Joaquim Fellmann
cdd5c47ed7 Update french translation for account console 2021-12-15 08:09:50 +01:00
aznamier
04da528b35
KEYCLOAK-19371 - fix for UI crash when logged in user has access to (#9088)
multiple realms and at the same time that user has only limited role
(eg: view-users) which does not allow to see realm details. Crash was
happening on switching the realm.
2021-12-14 14:10:50 -05:00
Pedro Igor
74970ac043 [fixes #9128] - Enable new admin console to Dist.X 2021-12-14 07:24:03 -08:00
Martin Bartoš
faefeccbee KEYCLOAK-19487 Test cases for managing 2FA authenticators in account console 2021-12-12 11:36:51 +01:00
Seán McGowan
38174212f9
Fix issue where Patternfly background clashes with Keycloak one (#8422) 2021-12-10 15:51:53 -05:00
Martin Bartoš
3c3c33038a
KEYCLOAK-19550 Completely remove Zocial CSS components (#8581) 2021-12-10 15:46:28 -05:00
Jon Koops
2d341ddc06 Renew personal access token for installing Admin UI 2021-12-09 14:00:50 +01:00
Martin Bartoš
5283db86c4 KEYCLOAK-19489 Verify WebAuthn settings in admin console 2021-12-08 10:12:48 +01:00
Martin Bartoš
7dc01a5a6e KEYCLOAK-13319 Use newest WebDriver/Selenium for the WebAuthn testing 2021-12-06 09:42:10 +01:00
Jon Koops
6a766884f6
[KEYCLOAK-17867] Update to latest version of NodeJS and Frontend Plugin (#7962) 2021-11-23 15:20:52 -05:00
Martin Bartoš
0d478206eb
KEYCLOAK-18980 Keycloak locale dropdown is active over whole form (#8561) 2021-11-22 20:20:37 -05:00
Sony Huang
743abf0fb1
KEYCLOAK-17522 fixed bug that keycloak instance not recognized by Safari (#7880) 2021-11-22 20:09:12 -05:00
bal1imb
661aca4452 KEYCLOAK-19283 Implemented new identity provider mapper "Advanced claim to group mapper" alongside tests. 2021-11-19 16:54:39 +01:00
Olivier Boudet
38448f3779 KEYCLOAK-19229 : french translation of emailInstructionUsername 2021-11-19 07:45:16 +01:00
Konstantinos Georgilakis
63c9845cb9 KEYCLOAK-18276 client content screen enhancement 2021-11-18 13:15:02 +01:00
stianst
f6daca8a60 Fix dl of admin-ui 2021-11-16 10:48:56 +01:00
Bruno Oliveira da Silva
2f8c5dd05e
[KEYCLOAK-19616] Update Keycloak themes dependencies for the account and admin console (#8645) 2021-11-12 12:30:50 -05:00
Rémy DUTHU
951a232b24 Update messages_es.properties
Add `loginAccountTitle` locale to `messages_es.properties`
2021-11-11 12:42:52 +01:00
Thomas Darimont
93d286fdc7 KEYCLOAK-19777 Fix typos in admin-console messages
overriden -> overridden
mesasge -> message
Username the Service Account -> Username of the Service Account

Signed-off-by: Thomas Darimont <thomas.darimont@googlemail.com>
2021-11-05 10:06:50 +01:00
mposolda
5740e158e3 KEYCLOAK-18744 OpenBanking Brasil fix for X509 client authentication. More flexibility in Subject DN comparison. 2021-11-05 09:10:50 +01:00
Jon Koops
36f7139bdd Add new personal access token for installing new Admin UI 2021-10-26 16:03:27 +02:00
Konstantinos Georgilakis
a5c8c45551 KEYCLOAK-19388 correct AttributeConsumingService bug in SAML SP metadata 2021-10-21 20:24:46 +02:00
Miklín Vojtěch
44ec565109 KEYCLOAK-19522: update login messages_cs 2021-10-20 19:13:37 +02:00
OskarsPakers
65ec15efc7 Convert utf8 code to symbols 2021-10-19 15:34:23 +02:00
OskarsPakers
01b92220d2 [feature/KEYCLOAK-15976]: KEYCLOAK-15976 Latvian language support 2021-10-19 15:34:23 +02:00
mposolda
c5432e71ad KEYCLOAK-19557 Misleading label for client parameter 'Pushed Authorization Request Enabled' 2021-10-15 08:56:20 +02:00
R Yamada
891c8e1a12 [KEYCLOAK-17653] - OIDC Frontchannel logout support 2021-10-07 15:27:19 -03:00
stianst
12157bb66c KEYCLOAK-19467 Add noopener/noreferrer to links 2021-10-05 15:00:05 +02:00
Thomas Darimont
9e6d6398b9
KEYCLOAK-11364 Revise Service Account roles page (#7098)
* KEYCLOAK-11364 Add link to service-account user in Service Account roles page

* KEYCLOAK-11364 Revise service-account page
2021-09-30 14:55:44 -04:00
Victor Häggqvist
d92bb7df65 fix typos in sv login messages 2021-09-30 13:34:01 +02:00
Daniel Fesenmeyer
339224578e KEYCLOAK-10603 adjust assignments to roles (user-role and group-role assignments, client-scope and client "scope mappings"): allow assignments of roles which are already indirectly assigned (e.g. by composite role)
- extend RoleMapperModel with method hasDirectRole(RoleModel), which only checks for direct assignment in contrast to the existing method hasRole(RoleModel)
- extend ScopeContainerModel with method hasDirectScope(RoleModel), which only checks for direct scope mapping in contrast to the existing method hasScope(RoleModel)
- use the new hasDirectRole and hasDirectScope methods to check whether a role is in the "available" list and whether it can be assigned (previously, the hasRole method was used for this purpose)
- add hint to UI that available roles contain effectively assigned roles which are not directly assigned
- adjust and extend tests
2021-09-22 13:56:29 +02:00
Nikolas Laskaris
8f09d34272
KEYCLOAK-18288 (#8096)
RealmsAdminResource now returns also a brief representation (not by default, to be backwards compatible) for realms[] if the appropriate flag is sent.
2021-09-20 15:32:15 -04:00
Vlastimil Elias
28e220fa6d KEYCLOAK-18497 - Support different input types in built-in dynamic forms 2021-09-20 09:14:49 -03:00
Miklín Vojtěch
78d3e2ebad KEYCLOAK-19300 Update Czech translation of email messages 2021-09-15 16:59:45 +02:00
Jeswin Simon
daf39e2a63
KEYCLOAK-19281 Added missing closing div tag in login-username template (#8435) 2021-09-15 16:52:11 +02:00
Stan Silvert
93e229e45d
KEYCLOAK-18512: Integrate New Admin Console into Keycloak build (#8366)
* KEYCLOAK-18512: Integrate New Admin Console into Keycloak build

* KEYCLOAK-18512: Integrate New Admin Console into Keycloak build

* Change version to project version.  Make experimental.

* Add PAT for reading packages (#12)

* Add PAT for reading packages

* Encode token

* Use generic GH account for installation of packages

* Enable Github packages repo only for snapshots

* KEYCLOAK-18512: Make ADMIN2 experimental instead of preview

* KEYCLOAK-18512: Remove early return

* KEYCLOAK-18512: Fix formatting issue

Co-authored-by: Jon Koops <jonkoops@gmail.com>
2021-09-15 10:09:06 -04:00
Miklín Vojtěch
24811f1ef5 KEYCLOAK-19288 Update Czech translation of login messages 2021-09-15 15:01:16 +02:00
Marek Posolda
11e5f66c60
KEYCLOAK-19056 EDIT MODE field should not be leave empty (#8380) 2021-09-14 20:27:09 +02:00
David Hellwig
a6cd80c933
KEYCLOAK-16076 added new warining when cookies are disabled -with new branch- (#7632)
* KEYCLOAK-16076 added new warining when cookies are disabled

Co-authored-by: David Hellwig <david.hellwig@bosch.com>
Co-authored-by: Christoph Leistert <christoph.leistert@bosch-si.com>
2021-09-13 11:30:11 +02:00
Olivier Boudet
c7f8544b0c KEYCLOAK-18454 Reset password : wrong email instructions when duplicates email is allowed 2021-09-02 14:44:18 +02:00
Martin Bartoš
7c243c8427 KEYCLOAK-18590 Save Button Enabled For Empty Attributes 2021-09-01 10:51:20 +02:00
mposolda
3e0f8aed30 KEYCLOAK-19038 Reload user after being updated 2021-08-17 19:28:18 +02:00
Yoshiyuki Tabata
b31b60fffe KEYCLOAK-18341 Support JWKS OAuth2 Client Metadata in the "by value" key loading method 2021-08-05 16:52:55 +02:00
cedric guindon
1ad34c6ab0 [KEYCLOAK-18498] French i18n contains wrong param 2021-08-03 12:37:13 +02:00
keycloak-bot
262ec3d031 Set version to 16.0.0-SNAPSHOT 2021-07-30 14:56:10 +02:00
Miklín Vojtěch
e44a7af0e4 KEYCLOAK-18913 Update messages_cs.properties
Czech translations for base login theme:
themes/src/main/resources-community/theme/base/login/messages/messages_cs.properties

Co-Authored-By: dklika <78177642+dklika@users.noreply.github.com>
Co-Authored-By: Hynek Mlnařík <hmlnarik@users.noreply.github.com>
2021-07-29 21:18:41 +02:00
Vlastimil Elias
32f2f095fe KEYCLOAK-7724 User Profile default validations 2021-07-29 08:42:37 +02:00
mposolda
4dacbb9e0b KEYCLOAK-16996 User not able to revoke his offline token for directGrant clients 2021-07-29 08:04:16 +02:00
Pedro Igor
7efc3e8170 [KEYCLOAK-18875] - Minor improvements to attribute group UI 2021-07-28 12:07:39 -03:00
Pedro Igor
ef72343a6a [KEYCLOAK-18882] - User Profile still tech preview 2021-07-28 08:45:35 +02:00
Joerg Matysiak
acb2ac1c8d KEYCLOAK-18875 UI for managing group of attributes 2021-07-28 08:42:30 +02:00
mposolda
643b3c4c5a KEYCLOAK-18594 CIBA Ping Mode 2021-07-27 08:33:17 +02:00
Martin Bartoš
2418e31952 KEYCLOAK-18685 Style in RH-SSO login screen is broken 2021-07-26 11:25:23 +02:00
Joerg Matysiak
9dff21d0a7 KEYCLOAK-18552
* added group as attribute metadata
* validation for groups and references to groups
* adapted template to use show attribute groups
* test and integration tests for attribute groups
2021-07-23 09:26:21 -03:00
Luca Leonardo Scorcia
6bd7420907 KEYCLOAK-17290 SAML Client - Generate AttributeConsumingService SP metadata section 2021-07-22 21:53:16 +02:00
Pedro Igor
7f34af4016 Revert "[KEYCLOAK-18425] - Allow mapping user profile attributes"
This reverts commit 3e07ca3c
2021-07-20 14:08:09 -03:00
Paulo Mateus
f1ee2826c1 [KEYCLOAK-18805] - Update Portuguese (Brazil) translations
- Fix `oauthGrantTitle` typo error
2021-07-20 12:26:29 -03:00
Pedro Igor
396a78bcc4 [KEYCLOAK-18723] - Configurable constraints for request object encryption 2021-07-20 09:28:09 +02:00
Martin Bartoš
8c49478628
KEYCLOAK-18699 Brand logo is not found for admin console (#8255) 2021-07-19 12:33:49 -04:00
Daniel Kobras
47f736f819 KEYCLOAK-17646 tool tip for krb5 multi-SPN config
The specified server principal is eventually passed to
createJaasConfigurationForServer() in
com.sun.security.auth.module.Krb5LoginModule, which accepts a special value of
'*' to indicate that tickets for all service principals contained in the given
keytab file should be accepted. This is the only way to allow more than one
service principal name (eg. for a multi-homes setup), and this setting is not
obvious without knowledge of the underlying API.

Signed-off-by: Daniel Kobras <kobras@puzzle-itc.de>
2021-07-15 21:10:42 +02:00
Jerome Marchand
108bd91edc KEYCLOAK-15909 Add sort in tables 2021-07-15 09:39:02 +02:00
Branden Cash
9d0c7ba488 Fix storeToken label association for gitlab idp 2021-07-15 09:31:25 +02:00
Vlastimil Elias
7618e66136 [KEYCLOAK-18541] separate template for IDP review page 2021-07-13 21:43:52 -03:00
Pedro Igor
1baab67f3b [KEYCLOAK-18630] - Request object encryption support 2021-07-09 11:27:30 -03:00
Pedro Igor
4099833be8 [KEYCLOAK-18693] - Declarative profile validating read-only attribute if it exists 2021-07-08 15:22:02 -03:00
Hryhorii Hevorkian
2803685cd7 KEYCLOAK-18353 Implement Pushed Authorization Request inside the Keycloak
Co-authored-by: Takashi Norimatsu <takashi.norimatsu.ws@hitachi.com>
Co-authored-by: mposolda <mposolda@gmail.com>
2021-07-03 08:47:42 +02:00
lbortoli
e5ae113453 KEYCLOAK-18452 FAPI JARM: JWT Secured Authorization Response Mode for OAuth 2.0 2021-07-03 00:00:32 +02:00
Vlastimil Elias
04ff2c327b [KEYCLOAK-18429] Support a dynamic update profile form 2021-07-02 10:22:47 -03:00
Vlastimil Elias
f32447bcc1 [KEYCLOAK-18424] GUI order for user profile attributes 2021-07-02 08:37:24 -03:00
Pedro Igor
3e07ca3c22 [KEYCLOAK-18425] - Allow mapping user profile attributes 2021-07-01 10:19:28 -03:00
Vlastimil Elias
7af2133924 KEYCLOAK-18542 - User Profile Admin UI - hide unused configurations for
username and email attributes
2021-07-01 10:07:08 -03:00
Luca Leonardo Scorcia
ae98d8ea28 KEYCLOAK-18315 SAML Client - Add parameter to request specific AttributeConsumingServiceIndex 2021-06-29 16:22:38 +02:00
Takashi Norimatsu
57c80483bb KEYCLOAK-17936 FAPI-CIBA : support Signed Authentication Request
Co-authored-by: Pritish Joshi <pritish@banfico.com>
Co-authored-by: mposolda <mposolda@gmail.com>
2021-06-29 08:07:40 +02:00
Pedro Igor
948f453e2d [KEYCLOAK-18427] - Allowing switching to declarative provider 2021-06-28 15:50:04 -03:00
Vlastimil Elias
512bcd14f7 [KEYCLOAK-18428] - dynamic registration form 2021-06-25 17:11:15 -03:00
Benjamin Weimer
6e4a0044fd KEYCLOAK-15371 Dont show backchannel logout options for bearer only clients in admin ui 2021-06-24 14:13:32 -03:00
Pedro Igor
faadb896ea [KEYCLOAK-18426] - Support required by role and scopes in Admin UI 2021-06-24 10:43:49 -03:00
Yoshiyuki Tabata
52ced98f92 KEYCLOAK-18503 Regex Policy for authorization service 2021-06-24 08:49:41 -03:00
Vlastimil Elias
b7a4fd8745 KEYCLOAK-18423 - Support a user-friendly name property for user profile
attributes
2021-06-24 08:17:06 -03:00
Clement Cureau
b102c892fa [KEYCLOAK-14046] Allow finegrain group admins to create users in console
- enable "Create" button and "Save" button in Admin Console Users views (list
and details)

The flag used to enable those button is computed as follow, since there's no computed flag
from backend on "admin user has fine grain admin permission on at least 1 group" :
  == (existing condition) || (feature "finegrain admin" is enabled && access.queryUsers)

If the admin user hasn't the correct permission on the right groups for the new user he's
trying to create, backend will forbid the creation by returning a 403

This change is following PR #7035, which added the Groups field in the User creation form
2021-06-22 18:26:31 -03:00
Vlastimil Elias
82491ae5d2 KEYCLOAK-17446 - Prefill username in "Forgot Your Password" form if
called from Login form
2021-06-22 08:48:43 -03:00
rmartinc
b8452374d2 [KEYCLOAK-18473] Add max length to password policy 2021-06-22 10:15:48 +02:00
keycloak-bot
13f7831a77 Set version to 15.0.0-SNAPSHOT 2021-06-18 10:42:27 +02:00
Pedro Igor
ef3a0ee06c [KEYCLOAK-17399] - Declarative User Profile and UI
Co-authored-by: Vlastimil Elias <velias@redhat.com>
2021-06-14 11:28:32 +02:00
Stan Silvert
b152d89e22 KEYCLOAK-18373: Cut and Paste in Groups broken 2021-06-10 08:33:42 +02:00
Martin Bartoš
07d57ca30f KEYCLOAK-17179 IdP mappers with MultiValued property can't be saved 2021-06-10 07:02:21 +02:00
Gregor Tudan
628274dee2 KEYCLOAK-16075: always show the register-button during webauthn-registration.
Safari will fail to register if the action has not been triggered by a user gesture.
2021-06-01 10:48:16 +02:00
Gregor Tudan
14407a631c KEYCLOAK-16075: show a button instead of logging in automatically with WebAuthn onLoad.
Safari will fail to use TouchID/FaceID if it is not triggered by an explicit user interaction. There is an open discussion in the WebAuthn-Spec to make this a mandatory behavior and quiet a few other auth-servers have adopted this behavior.
2021-06-01 10:48:16 +02:00
Václav Muzikář
20b29f7b99 UI fixes 2021-05-31 12:31:52 +02:00
mposolda
73a38997d8 KEYCLOAK-14208 Default client profiles for FAPI 2021-05-31 12:31:52 +02:00
mposolda
6e139b8fda KEYCLOAK-18280 Issues with boolean properties of executors 2021-05-31 12:31:52 +02:00
Stian Thorgersen
2cb59e2503
KEYCLOAK-17844 Add option to disable authorization services to workaround issues with many clients 2021-05-27 22:28:56 +02:00
Yoshiyuki Tabata
c52d0babce KEYCLOAK-17491 Move the key settings to the new Keys tab 2021-05-27 15:26:40 +02:00
Takashi Norimatsu
6532baa9a7 KEYCLOAK-18127 Option for skip return user's claims in the ID Token for hybrid flow 2021-05-24 08:02:34 +02:00
Michito Okai
cc2d6f0741 KEYCLOAK-18235 Display of options about device grant when selecting
"public" as the access type
2021-05-21 08:24:27 +02:00
Vlastimil Elias
4ad1687f2b [KEYCLOAK-17399] UserProfile SPI - Validation SPI integration 2021-05-20 15:26:17 -03:00
Václav Muzikář
7c2341f1ed KEYCLOAK-18041 Client Policy UI Improvements: Action column for built-in profile 2021-05-20 16:38:26 +02:00
Václav Muzikář
d0f01740be KEYCLOAK-18043 Client Policy UI Improvements: Navigation 2021-05-20 07:54:53 +02:00
Vlastimil Eliáš
0913a22c30
KEYCLOAK-2045 Simple Validation SPI for UserProfile SPI (#8053)
* KEYCLOAK-2045 Simple Validation API

Co-authored-by: Thomas Darimont <thomas.darimont@googlemail.com>
2021-05-19 13:57:34 -03:00
Václav Muzikář
23fef24fe1 KEYCLOAK-18042 Client Policy UI Improvements: Add delete confirmation modal dialog 2021-05-19 11:57:14 +02:00
Václav Muzikář
65fbf3f68c KEYCLOAK-18079 Client Policy UI Improvements: JSON error handling 2021-05-18 16:12:48 +02:00
mposolda
b8a7750000 KEYCLOAK-18113 Refactor some executor/condition provider IDs 2021-05-18 09:17:41 +02:00
Nikolas Laskaris
35601aaaba
KEYCLOAK-17140 (#7781) 2021-05-17 14:49:26 -04:00
Pedro Igor
62e17f3be7 [KEYCLOAK-17588] - Authz confirmation popping out twice 2021-05-14 07:21:06 -03:00
Bruno Oliveira da Silva
a6ab3119d6
[KEYCLOAK-18059] Upgrade dev dependencies for the new Account Console (#8020) 2021-05-13 19:37:22 -04:00
Marek Posolda
a6d4316084
KEYCLOAK-14209 Client policies admin console support. Changing of format of JSON for client policies and profiles. Remove support for default policies (#7969)
* KEYCLOAK-14209 KEYCLOAK-17988 Client policies admin console support. Changing of format of JSON for client policies and profiles. Refactoring based on feedback and remove builtin policies
2021-05-12 16:19:55 +02:00
Erik Jan de Wit
e318d24301
KEYCLOAK-17098 use open boolean per section for mobile kebab (#7949) 2021-05-06 09:11:35 -04:00
keycloak-bot
4b44f7d566 Set version to 14.0.0-SNAPSHOT 2021-05-06 14:55:01 +02:00
rmartinc
7de5e7d298
KEYCLOAK-17074 Infinite loop logging as an user or impersonating an user as admin (#7799) 2021-05-03 21:05:12 -04:00
Christoph Leistert
b75648bda2 KEYCLOAK-17284 Evaluate ID-Token and UserInfo-Endpoint:
- add additional REST endpoints for evaluation:
  - for ID Token: GET /realm/clients/id/evaluate-scopes/generate-example-id-token
  - for UserInfo-Endpoint: GET /realm/clients/id/evaluate-scopes/generate-example-userinfo
- extend UI: add additional tabs "Generated ID Token" and "Generated User Info" to the client scopes evaluation screen

Co-authored-by: Daniel Fesenmeyer <daniel.fesenmeyer@bosch.io>
2021-04-29 16:45:30 +02:00
Takashi Norimatsu
65c48a4183
KEYCLOAK-12137 OpenID Connect Client Initiated Backchannel Authentication (CIBA) (#7679)
* KEYCLOAK-12137 OpenID Connect Client Initiated Backchannel Authentication (CIBA)

Co-authored-by: Andrii Murashkin <amu@adorsys.com.ua>
Co-authored-by: Christophe Lannoy <c4r1570p4e@gmail.com>
Co-authored-by: Pedro Igor <pigor.craveiro@gmail.com>
Co-authored-by: mposolda <mposolda@gmail.com>
2021-04-29 15:56:39 +02:00
Yoshiyuki Tabata
45202bd49a KEYCLOAK-17637 Client Scope Policy for authorization service 2021-04-26 08:58:33 -03:00
Réda Housni Alaoui
ae9df51438 KEYCLOAK-17608 Missing french translation for loginAccountTitle 2021-04-23 10:15:26 +02:00
i7a7467
ada7f37430 KEYCLOAK-16918 Set custom user attribute to Name ID Format for a SAML client
https://issues.redhat.com/browse/KEYCLOAK-16918

Co-authored-by: Michal Hajas <mhajas@redhat.com>
2021-04-20 10:29:17 +02:00
AlistairDoswald
8b3e77bf81 KEYCLOAK-9992 Support for ARTIFACT binding in server to client communication
Co-authored-by: AlistairDoswald <alistair.doswald@elca.ch>
Co-authored-by: harture <harture414@gmail.com>
Co-authored-by: Michal Hajas <mhajas@redhat.com>
2021-04-16 12:15:59 +02:00
Martin Bartoš
5a9068e732 KEYCLOAK-16401 Deny/Allow access in a conditional context 2021-04-09 12:04:45 +02:00
Michito Okai
d9ebbe4958 KEYCLOAK-17202 Restrict Issuance of Refresh tokens to specific clients 2021-04-08 11:51:25 +02:00
Martin Bartoš
f203e4808d
KEYCLOAK-16898 Locale dropdown is broken in IE11 (#7808) 2021-04-06 10:23:39 +02:00
Konstantinos Georgilakis
ec5c256562 KEYCLOAK-5657 Support for transient NameIDPolicy and AllowCreate in SAML IdP 2021-03-31 14:45:39 +02:00
Bodo Graumann
0033b7daf7 [KEYCLOAK-17166] Use radio buttons for otp select 2021-03-29 15:46:34 +02:00
Stan Silvert
717d9515fa
KEYCLOAK-16890: Stored XSS attack on new acct console (#7867) 2021-03-22 11:24:12 +01:00
Stan Silvert
3b80eee5bf KEYCLOAK-17033: Reflected XSS attack with referrer in new account
console
2021-03-22 11:22:23 +01:00