Commit graph

870 commits

Author SHA1 Message Date
Sergey Vikulov
996ceb2ce8 Fixed typo in messages of base theme (#5890) 2019-04-29 14:40:37 +01:00
Stan Silvert
6806a4c660 KEYCLOAK-7219: Remove keycloak.js from new Account Console 2019-04-22 13:56:08 -03:00
Stan Silvert
e52be73d41 KEYCLOAK-10074: Account Console Performance 2019-04-22 09:47:12 -03:00
keycloak-bot
49d4e935cb Set version to 7.0.0-SNAPSHOT 2019-04-17 09:48:07 +01:00
moehman
0193e78ff9 KEYCLOAK-10070 Fix typo in account/message_de.properties 2019-04-16 08:39:34 +02:00
Stan Silvert
2736dd9d61 KEYCLOAK-9644: Implement Nav and Headers using PF4 React 2019-04-12 16:15:51 -03:00
mposolda
81a37d3496 KEYCLOAK-7144 Improve admin console label/tooltip around anonymous bind option in LDAP storage provider 2019-04-12 20:23:33 +02:00
stianst
e7deb77725 Fix NPM dependency to download using https 2019-04-12 08:09:30 +01:00
Francesco Degrassi
5b78063dce KEYCLOAK-6614: Support requesting refresh tokens from Google using access_type=offline 2019-04-08 15:06:03 -03:00
Thomas Darimont
5eb9291f37 KEYCLOAK-9574 Fix broken Role Selection for LDAP Mapper in Admin-Console (#5883)
We now wrap the result of a role-selection in an JS array and
use the config value as is for rendering, instead of extracting
the first component (which was the first char, since the value
is a string).

Previously any mapper that used role selection could not be
used due to `LDAPMapperCreateCtrl` generating invalid config structures.

Since the component configuration is represented via
org.keycloak.representations.idm.ComponentRepresentation whose
`config` property is a `MultivaluedHashMap`
config values needs to be passed as an Array. However the
LDAPMapperCreateCtrl in (users.js) only passed the role as a String.

Signed-off-by: Thomas Darimont <thomas.darimont@googlemail.com>
2019-03-27 19:26:03 +01:00
Stan Silvert
837909fdfd KEYCLOAK-9657: Implement responsive Welcome Screen 2019-03-22 14:36:29 -03:00
Stan Silvert
a795bc0e3a KEYCLOAK-9659: Create readme build instructions for new account console. 2019-03-20 15:46:01 -03:00
mposolda
db271f7150 KEYCLOAK-9572 Support for multiple CRLs with X509 authentication 2019-03-20 15:00:44 +01:00
Stan Silvert
44b0f4efd3 KEYCLOAK-9656: Add linting to account management 2019-03-19 13:57:30 -03:00
Hynek Mlnarik
1c906c834b KEYCLOAK-3373 Remove SAML IdP descriptor from client installation and publicize it in realm endpoint instead 2019-03-19 11:37:15 +01:00
rmartinc
231db059b2 KEYCLOAK-8996: Provide a way to set a responder certificate in OCSP/X509 Authenticator 2019-03-07 07:57:20 +01:00
keycloak-bot
e843d84f6e Set version to 6.0.0-SNAPSHOT 2019-03-06 15:54:08 +01:00
Stan Silvert
fe5966d224 KEYCLOAK-8602: PatternFly 4 integration 2019-02-25 08:26:54 -03:00
Stan Silvert
ccd6d248f4 KEYCLOAK-8603: Reimplement 'back to application' in react 2019-02-25 08:26:54 -03:00
stianst
e06c705ca8 Set version 5.0.0 2019-02-21 09:35:14 +01:00
Stan Silvert
9e16c772bd KEYCLOAK-9387: Add hor scroll & tooltips to role selectors 2019-02-19 21:03:52 +01:00
stianst
7c9f15778a Set version to 4.8.3.Final 2019-01-09 20:39:30 +01:00
stianst
7c4890152c Set version to 4.8.2 2019-01-03 14:43:22 +01:00
Andreas
83b2642c4e Update messages_no.properties
Added translation consistent with the value in messages_en.properties, also removed HTML tags since they display as plain text.
2019-01-02 13:53:35 +01:00
Axel Messinese
4150daa9cb KEYCLOAK-9056 Change wrong params passed to /groups endpoint in groups and user panel 2018-12-14 08:35:32 +01:00
Johannes Knutsen
044926225f Fix wrong 'for' attribute on input label 2018-12-13 16:00:48 +01:00
Stan Silvert
5011e07270 KEYCLOAK-8935: Wrong product name on Welcome Page 2018-12-13 09:02:56 +01:00
Ramunas Kraujutis
5b041c0362 switch to UTF-8 encoding for Lithuanian translations (for easier readability and easrier editing) 2018-12-11 14:20:40 +01:00
Stan Silvert
40071a95da KEYCLOAK-9038: Add password page and refactor 2018-12-10 15:08:35 -05:00
Pedro Igor
0c39eda8d2 [KECLOAK-8237] - Openshift Client Storage 2018-12-06 10:57:53 -02:00
stianst
b674c0d4d9 Prepare for 4.8.0.Final 2018-12-04 13:54:25 +01:00
Stan Silvert
3c8dddf33e KEYCLOAK-8758: Implement i18n/l10n 2018-11-26 16:39:06 -05:00
Stian Thorgersen
3756cf629b
KEYCLOAK-7081 Fixes for manual/qr mode switches on login config otp page (#5717) 2018-11-19 14:32:28 +01:00
Takashi Norimatsu
0793234c19 KEYCLOAK-8460 Request Object Signature Verification Other Than RS256 (#5603)
* KEYCLOAK-8460 Request Object Signature Verification Other Than RS256

also support client signed signature verification by refactored token
verification mechanism

* KEYCLOAK-8460 Request Object Signature Verification Other Than RS256

incorporate feedbacks and refactor client public key loading mechanism

* KEYCLOAK-8460 Request Object Signature Verification Other Than RS256

unsigned request object not allowed

* KEYCLOAK-8460 Request Object Signature Verification Other Than RS256

revert to re-support "none"
2018-11-19 14:28:32 +01:00
Stan Silvert
0b36020bf5 KEYCLOAK-8759: Wrong RH-SSO name on Welcome Page 2018-11-15 13:00:55 -05:00
Leon Graser
85f11873c3 KEYCLOAK-8613 Group Membership Pagination 2018-11-15 17:54:07 +01:00
Thomas Darimont
cf57a1bc4b KEYCLOAK-1267 Add dedicated SSO timeouts for Remember-Me
Previously remember-me sessions where tied to the SSO max session
timeout which could lead to unexpected early session timeouts.
We now allow SSO timeouts to be configured separately for sessions
with enabled remember-me. This enables users to opt-in for longer
session timeouts.

SSO session timeouts for remember-me can now be configured in the
tokens tab in the realm admin console. This new configuration is
optional and will tipically host values larger than the regular
max SSO timeouts. If no value is specified for remember-me timeouts
then the regular max SSO timeouts will be used.

Work based on PR https://github.com/keycloak/keycloak/pull/3161 by
Thomas Darimont <thomas.darimont@gmail.com>
2018-11-15 06:11:22 +01:00
stianst
ecd476fb10 Prepare for 4.7.0.Final 2018-11-14 20:10:59 +01:00
Stan Silvert
086dbae5ca KEYCLOAK-8604: Figure out how forms will be handled 2018-11-13 07:45:50 -05:00
Adil ARLI
28eb1007fb Add Turkish Language File (#5678)
* Add Turkish Language File

* Resolve typo

* Resolve typo

* Capital letters corrections.
2018-11-12 11:49:56 +01:00
Jacob van Lingen
e7b7307b4f Update messages_nl.properties (#5677)
* Update messages_nl.properties

Updated it to latest keys.

* Update messages_nl.properties
2018-11-08 16:29:18 +01:00
Stan Silvert
94f2ce2eae KEYCLOAK-8250: Save not disabled properly in token settings 2018-11-06 07:58:57 -05:00
rmartinc
cbe59f03b7 KEYCLOAK-8708: Provide aggregation of group attributes for mappers 2018-11-06 13:42:38 +01:00
Stan Silvert
d0f75c8766 KEYCLOAK-8541: Upgrade AngularJS to 1.6.10 2018-11-01 08:51:50 +01:00
mposolda
9652748ba9 KEYCLOAK-8484 Remove audience client scope template 2018-10-31 11:11:02 +01:00
Graser Leon
9ef4c7fffd KEYCLOAK-8377 Role Attributes 2018-10-24 22:04:28 +02:00
Stan Silvert
7e12b60158 KEYCLOAK-8140: User Fed table header doesn't span all rows 2018-10-24 11:07:43 -04:00
Stan Silvert
f55264499c KEYCLOAK-7700: Add realm broken when page width < 992px 2018-10-24 08:47:16 -04:00
Stan Silvert
ec335629b4 KEYCLOAK: 8601: Evaluate REST/HTTP packages for React 2018-10-23 08:51:38 -04:00
Pedro Igor
c536955b70 [KEYCLOAK-7826] - My resource pages does not support resources without scopes 2018-10-23 08:38:22 -03:00