Sebastian Laskawiec
e213c1c791
KEYCLOAK-12410 Deploying themes using Keycloak Operator
2020-09-17 18:39:06 -03:00
Erik Jan de Wit
43a4132beb
let post css use all paths ( #102 )
2020-09-17 11:13:04 -04:00
Erik Jan de Wit
338e177c51
added react hook form to do forms ( #99 )
...
* added react hook form to do forms
* removed unnessary property
2020-09-17 09:51:40 -04:00
Erik Jan de Wit
b87bd2ca76
updated the realm selector ( #90 )
...
* updated the realm selector with:
1. realm context that works on other requests
2. added search bar when realm list > 5 realms
* fixed merge
2020-09-17 07:37:30 -04:00
Martin Kanis
f037dabdc1
KEYCLOAK-15199 Use stream variant method in jpa/RoleAdapter.getFirstAttribute
2020-09-17 13:18:21 +02:00
Pedro Igor
3fd6f0ce10
[KEYCLOAK-14255] - Fixing tests
2020-09-17 10:38:41 +02:00
Luca Leonardo Scorcia
c6608c1561
KEYCLOAK-15383 Translation strings escaped twice in saml-post-form.ftl
2020-09-16 21:31:51 +02:00
Pedro Igor
0978d78a48
[KEYCLOAK-14255] - Initial changes to configuration
2020-09-16 20:03:52 +02:00
Erik Jan de Wit
79c8942eeb
changed messages to keys ( #88 )
2020-09-16 10:56:23 -04:00
Luca Leonardo Scorcia
3973d47bd4
KEYCLOAK-15465 SAML Identity Broker - SP metadata writer always emits AttributeConsumingService isDefault attribute
...
The isDefault attribute is defined as optional, yet if it set to null Keycloak incorrectly emits the value isDefault="null".
2020-09-16 16:44:19 +02:00
Luca Leonardo Scorcia
d4302c0b88
KEYCLOAK-15485 Add option to enable SAML SP metadata signature
2020-09-16 16:40:49 +02:00
Luca Leonardo Scorcia
10077b1efe
KEYCLOAK-15485 Add option to enable SAML SP metadata signature
2020-09-16 16:40:45 +02:00
Mark Wolfe
3723d78e3c
KEYCLOAK-15460 Fix missing event types in SAML endpoint
...
A change was done in 32f13016fa
which isn't setting the type for events and causing an internal error.
2020-09-16 16:36:19 +02:00
Martin Kanis
5d5e56dde3
KEYCLOAK-15199 Complement methods for accessing roles with Stream variants
2020-09-16 16:29:51 +02:00
Benjamin Weimer
f874e9a43c
KEYCLOAK-9874 include realm and client roles in user info response
2020-09-16 10:01:02 +02:00
Joaquim Fellmann
be4780243b
KEYCLOAK-15483 Replace badly displayed HTML message with simple text message for french locale (align with en, de, pt, po, tr, nl locales)
2020-09-15 17:09:53 -04:00
Erik Jan de Wit
601bba8057
initial version of groups ( #86 )
2020-09-15 15:54:52 -04:00
Erik Jan de Wit
3798c41db0
Added missing logic to realm form ( #80 )
...
* made alerts easier to use
* better clear message
* added missing logic to realm form
* format
* fixed types
* fixed test
* fix merge error
2020-09-15 15:44:28 -04:00
Eugenia
782a09e064
Merge pull request #93 from keycloak/edewit-patch-1
...
fix link
2020-09-15 10:07:03 -04:00
Erik Jan de Wit
fccff61c17
fix link
2020-09-15 15:41:40 +02:00
Christie Molloy
bbd98e0fb0
Merge pull request #91 from srambach/add-addons
...
adds patternfly addons
2020-09-14 16:21:03 -04:00
Sarah Rambacher
41b52c0666
adds patternfly addons
2020-09-14 15:49:31 -04:00
Takashi Norimatsu
b670734eec
KEYCLOAK-14205 FAPI-RW Client Policy - Executor : Enforce Response Type of OIDC Hybrid Flow
2020-09-14 20:58:25 +02:00
Hynek Mlnarik
a05066d567
KEYCLOAK-15477 Fix permission evaluation logic
2020-09-14 20:53:46 +02:00
Sarah Rambacher
bb38bcf051
Restyle realm selector and fix centering ( #87 )
...
* clean up CSS on realm selector
* Fix width and correct CSS of realm selector
* Format and update snapshots
* Remove module css
* update snapshot
2020-09-14 14:10:54 -04:00
Konstantinos Georgilakis
f4f58ab707
KEYCLOAK-15540 correct SAMLAttributeConsumingServiceParser
2020-09-14 16:01:46 +02:00
mposolda
4123b7a91e
KEYCLOAK-11678 Remove dummy resource. Adding keycloak-services and liquibase to jandex indexing
2020-09-14 09:27:34 -03:00
vmuzikar
a9a719b88c
KEYCLOAK-15270 Account REST API doesn't verify audience
2020-09-14 08:43:09 -03:00
Dmitry Telegin
b62d68a591
KEYCLOAK-14952 - Unit test failure in keycloak-saml-core on Java 11
2020-09-14 11:17:57 +02:00
Stan Silvert
6348266175
Update README.md
2020-09-13 16:15:30 -04:00
Erik Jan de Wit
55a0f443ed
small fix to make the alert test more readable ( #85 )
2020-09-11 14:34:43 -04:00
mhajas
3186f1b5a9
KEYCLOAK-15514 Update AbstractStorageManager to check capability interface types
2020-09-11 14:42:48 +02:00
vmuzikar
cb5c893d87
Add tests for KEYCLOAK-15481
2020-09-11 07:03:24 -04:00
Stan Silvert
952e8fecee
KEYCLOAK-15481: Display forbidden screen
2020-09-11 07:03:24 -04:00
Miquel Simon
2572b1464b
KEYCLOAK-15395. Removed totp/remove (DELETE) and credentials/password (GET, POST) endpoints.
2020-09-10 18:03:03 -03:00
Erik Jan de Wit
1297c9f391
Restructure ( #78 )
...
* moved files into new structure
* translation files / namespace per "page"
fixes : #77
* renamed pages to sections
* moved save, delete and others to common bundle
2020-09-10 14:04:03 -04:00
Takashi Norimatsu
af2f18449b
KEYCLOAK-14195 FAPI-RW Client Policy - Condition : Client - Client Role
2020-09-10 18:34:19 +02:00
Clement Cureau
b19fe5c01b
Finegrain admin as fallback and added some tests
2020-09-10 12:26:55 -03:00
Clement Cureau
73378df52e
[KEYCLOAK-11621] Allow user creation via group permissions (Admin API)
...
Problem:
Using fine-grained admin permissions on groups, it is not permitted to create new users
within a group.
Cause:
The POST /{realm}/users API does not check permission for each group part of the new
user representation
Solution:
- Change access logic for POST /{realm}/users to require MANAGE_MEMBERS and
MANAGE_MEMBERSHIP permissions on each of the incoming groups
Tests:
Manual API testing performed:
1. admin user from master realm:
- POST /{realm}/users without groups => HTTP 201 user created
- POST /{realm}/users with groups => HTTP 201 user created
2. user with MANAGE_MEMBERS & MANAGE_MEMBERSHIP permissions on group1
- POST /{realm}/users without groups => HTTP 403 user NOT created
- POST /{realm}/users with group1 => HTTP 201 user created
- POST /{realm}/users with group1 & group2 => HTTP 403 user NOT created
- POST /{realm}/users with group1 & wrong group path => HTTP 400 user NOT created
3. user with MANAGE_MEMBERS permission on group1
- POST /{realm}/users without groups => HTTP 403 user NOT created
- POST /{realm}/users with group1 => HTTP 403 user NOT created
- POST /{realm}/users with group1 & group2 => HTTP 403 user NOT created
- POST /{realm}/users with group1 & wrong group path => HTTP 400 user NOT created
2020-09-10 12:26:55 -03:00
testn
706299557e
KEYCLOAK-15174: ResourceServerAdapter.toEntity checks the wrong type
2020-09-10 12:19:25 -03:00
testn
c288175c03
KEYCLOAK-15208: PermissionTicketAdapter checks for the wrong type
2020-09-10 12:16:48 -03:00
Heikki Simperi
4500dcbbc6
KEYCLOAK-13837 Admin cli command has alias parameter should be keyAlias
2020-09-10 10:58:52 -03:00
Andy Munro
df1cb476fe
KEYCLOAK-14845 Updating IBM Z and OpenJ9 terminology
2020-09-09 15:02:07 -03:00
Sebastian Laskawiec
e01159a943
KEYCLOAK-14767 OpenShift Review Endpoint audience fix
2020-09-09 11:57:24 -03:00
Erik Jan de Wit
7f66895631
added export and delete ( #63 )
...
* added export and delete
* added types
2020-09-09 16:34:05 +02:00
Michael Furman
6b9a5f2854
Update spring-security-adapter.adoc
2020-09-09 11:19:57 +02:00
Michael Furman
cdbdac6c36
Fixing KEYCLOAK-14642
...
Fixing documentation to resolve KEYCLOAK-14642
2020-09-09 11:19:57 +02:00
Takashi Norimatsu
cbb79f0430
KEYCLOAK-15448 FAPI-RW : Error Response on OIDC private_key_jwt Client Authentication Error (400 error=invalid_client)
2020-09-09 11:14:21 +02:00
Stan Silvert
8fbcf7582a
Flesh out left navigation ( #76 )
...
Co-authored-by: Erik Jan de Wit <erikjan.dewit@gmail.com>
2020-09-09 11:07:17 +02:00
mhajas
df52c12ebb
KEYCLOAK-15479 Replace enlistAfterCompletion with enlist in MapClientProvider
2020-09-09 08:27:38 +02:00