Bill Burke
c709598fdd
user fed spi simple test
2016-07-20 10:59:45 -04:00
Stian Thorgersen
f384c2340e
KEYCLOAK-3266 password policy NotUsername breaks new user registration
2016-07-15 07:34:13 +02:00
Stian Thorgersen
ea44b5888b
KEYCLOAK-2824 Password Policy SPI
2016-07-14 07:20:30 +02:00
mposolda
c10a005997
KEYCLOAK-3290 UserInfoEndpoint error responses don't have correct statuses
2016-07-08 12:15:07 +02:00
Bill Burke
bf2ca4008e
log level info
2016-07-07 12:06:57 -04:00
Bill Burke
0040d3fc3b
Merge remote-tracking branch 'upstream/master'
2016-07-07 10:35:45 -04:00
Bill Burke
7e5a5f79cf
fixes for new user fed spi
2016-07-07 10:35:35 -04:00
Stan Silvert
4628946a55
Automatically migrate required action name.
2016-07-05 15:07:54 -04:00
Stan Silvert
a231c1b31b
RHSSO-296: Required Action "Configure Totp" should be "Configure OTP"
2016-07-05 15:07:52 -04:00
Stian Thorgersen
7cfee80e58
KEYCLOAK-3189 KEYCLOAK-3190 Add kid and typ to JWT header
2016-07-05 08:26:26 +02:00
Stian Thorgersen
450b57c76a
Merge pull request #2984 from stianst/master
...
KEYCLOAK-3172 Add view authorization role to existing realms
2016-07-01 12:41:09 +02:00
Bill Burke
a19469aba5
Merge remote-tracking branch 'upstream/master'
2016-06-30 17:18:17 -04:00
Bill Burke
b224917fc5
bump version
2016-06-30 17:17:53 -04:00
Bill Burke
3f1eecc4be
Merge remote-tracking branch 'upstream/master'
2016-06-30 16:47:55 -04:00
Pedro Igor
afa9471c7c
[KEYCLOAK-3128] - Admin Client Authorization Endpoints
2016-06-30 10:26:05 -03:00
Stian Thorgersen
1fe8da67dc
KEYCLOAK-3172 Add view authorization role to existing realms
2016-06-30 08:52:18 +02:00
Bill Burke
a9f6948d74
Merge remote-tracking branch 'upstream/master'
2016-06-29 15:37:32 -04:00
Bill Burke
f51098c50b
user fed refactor
2016-06-29 15:37:22 -04:00
Pedro Igor
8b0bf503c3
[KEYCLOAK-3172] - Migrating older versions with authorization services.
2016-06-29 12:07:49 -03:00
mposolda
5c731b4d14
KEYCLOAK-3149 DB update triggered before DBLock is retrieved
2016-06-21 17:14:25 +02:00
Erik Mulder
f4ead484de
KEYCLOAK-2474 Possibility to add custom SPI and extend the data model
2016-06-20 10:56:33 +02:00
Stian Thorgersen
3c0f7e2ee2
Merge pull request #2617 from pedroigor/KEYCLOAK-2753
...
[KEYCLOAK-2753] - Fine-grained Authorization Services
2016-06-17 13:40:15 +02:00
Pedro Igor
086c29112a
[KEYCLOAK-2753] - Fine-grained Authorization Services
2016-06-17 02:07:34 -03:00
Stian Thorgersen
e538394e60
KEYCLOAK-3091 Change brute force to use userId
2016-06-13 15:30:13 +02:00
Bill Burke
4c9a0b45d4
Merge pull request #2229 from thomasdarimont/issue/KEYCLOAK-2489-script-based-authenticator-definitions
...
KEYCLOAK-2489 - Add support for Script-based AuthenticationExecution definitions.
2016-06-05 11:12:05 -04:00
Thomas Darimont
4bc64350b2
KEYCLOAK-3021: Add Realm Display Name to the label part of the otpauth URI.
...
Due to the removal of the realm-displayname as a result of changes made for KEYCLOAK-2410
the otpauth URI no longer included the realm display name as a hint for the user to which system an
authenticator belongs to.
We now ensure that the realm display name is again part of the label component of the otpauth URI.
This enables a user to better distinguish between user accounts for different systems.
2016-05-20 13:59:19 +02:00
Thomas Darimont
c8d47926b8
KEYCLOAK-2489 - Add support for Script-based AuthenticationExecution definitions.
...
This is a POC for script based authenticator support.
Introduced a ScriptBasedAuthenticator that is bootstraped via a
ScriptBasedAuthenticatorFactory can be execute a configured script
against a provided execution context.
Added an alias property to the AuthFlowExecutionRepresentation in order
to be able to differentiate multiple instances of an Authenticator
within the same AuthFlow.
For convenience editing the AngularJS bindings for the ACE editor were
added for fancy script editing - this needs to be cut down a bit wrt to
themes and supported scripts - e.g. we probably don't expect users to write
authenticator scripts in Cobol...
Removed currently not needed ACE sytax highlighting and themes.
Scripting is now available to all keycloak components that have access to the KeycloakSession.
Introduced new Scripting SPI for configurable scripting providers.
2016-04-27 14:37:13 +02:00
mposolda
afc8179cf8
KEYCLOAK-2846 export/import of clientTemplate scopes
2016-04-20 13:30:01 +02:00
mposolda
32d7464e52
KEYCLOAK-2819 Fix realm security header setup after migration
2016-04-14 10:43:48 +02:00
Bill Burke
8f7f9e0b9c
KEYCLOAK-2790
2016-04-12 18:25:23 -04:00
Stian Thorgersen
1c2eafeb80
KEYCLOAK-2807 Fix server info providers page
2016-04-12 15:38:52 +02:00
Stian Thorgersen
01beff741d
KEYCLOAK-2766 Add missing id to AuthenticatorConfigRepresentation
2016-04-11 07:42:55 +02:00
mposolda
90fc721315
KEYCLOAK-2614 Refactor database lock to use 'SELECT FOR UPDATE' pessimistic locking
2016-04-08 12:20:54 +02:00
Stian Thorgersen
8de8446cb5
Merge pull request #2520 from stianst/KEYCLOAK-2756
...
KEYCLOAK-2756
2016-04-06 19:25:53 +02:00
Stian Thorgersen
6ccf3549ad
KEYCLOAK-2756
...
Renaming a realm breaks down the Clients
2016-04-06 15:18:49 +02:00
mposolda
72371e5d76
KEYCLOAK-1982 Some builtin objects might be missing when import JSON exported from old versions
2016-04-06 11:43:58 +02:00
Stian Thorgersen
0c829cd605
KEYCLOAK-2262 Refactor realm resource provider, remove admin resource provider and added example
2016-04-06 10:24:30 +02:00
Pedro Igor
e876a3c988
[KEYCLOAK-2262] - New SPIs to extend both Realm and Admin RESTful APIs
2016-04-06 09:43:24 +02:00
Stian Thorgersen
134c9b11c0
KEYCLOAK-2608
...
Timestamp resolution of 1s for Event.time is inappropriate for use with tests
2016-04-04 08:30:01 +02:00
Bill Burke
4d5ae5dd68
KEYCLOAK-2512
2016-04-01 14:50:26 -04:00
mposolda
36bc97e3cd
KEYCLOAK-2661 Broken migration from Keycloak 1.5 with Mongo 3
2016-03-31 22:30:41 +02:00
Bill Burke
12bf4b498e
KEYCLOAK-2691
2016-03-30 15:07:24 -04:00
mposolda
c9545e16f7
KEYCLOAK-2713 Fix error at startup
2016-03-24 15:30:53 +01:00
Thomas Darimont
fa8af64098
KEYCLOAK-2686 - Fix failing migration from 1.9.1 to 1.9.2.
...
Since the `Map` returned by `realm.getBrowserSecurityHeaders()` is unmodifiable
we need to add the new header setting to a copy of the map which we then set
on the realm.
2016-03-21 09:52:25 +01:00
mposolda
2d188068c4
KEYCLOAK-2644 Delete user with a READ_ONLY LDAP federation provider just from Keycloak DB
2016-03-14 09:39:14 +01:00
mposolda
85ccd64e01
KEYCLOAK-2643 Added write-only property to LDAP full-name attribute mapper
2016-03-11 22:32:55 +01:00
mposolda
73c3534e7a
KEYCLOAK-2629 LDAP Federation provider - input fields validation
2016-03-11 22:32:45 +01:00
Stian Thorgersen
7342261dbe
KEYCLOAK-2593 Character set missing from responses and no content sniffing defense in place
2016-03-11 15:31:15 +01:00
Bill Burke
82ad26189f
refactor user cache
2016-03-10 13:01:21 -05:00
Stian Thorgersen
36f2febde1
Next is 2.0.0.CR1
2016-03-10 13:01:18 -05:00