Stan Silvert
ed79c2a861
Revert "Include Admin UI as a regular dependency ( #11156 )" ( #11280 )
...
This reverts commit 31c272d73f
.
2022-04-13 09:19:49 -04:00
Jon Koops
31c272d73f
Include Admin UI as a regular dependency ( #11156 )
2022-04-13 09:18:56 -04:00
Giacomo Altiero
3b7243cd47
Support for UserInfo response encrypted ( #10519 )
...
Close #10517
2022-04-12 14:01:14 +02:00
Dennis
0e00d9afdd
Added german locales ( #11106 )
...
Fixes #11105
Reviewed in #11095
2022-04-07 13:18:17 +02:00
Neon Ngo
f11573eeb2
KEYCLOAK-13828 Allow override of baseUrl and apiUrl in GitHub identity provider ( #7021 )
...
Allow override of baseUrl & apiUrl in GitHub identity provider
Closes #11144
2022-04-06 13:45:11 +02:00
Tyler Andor
caebe50d7e
Updates patternfly libs and fixes breaking changes ( #10748 )
...
adding nvmrc
CIAM-1048 Device Activity screen PF updates
CIAM-1046: Personal Info sub-header update
Updates SigningInPage to use EmptyState component when there are no credentials.
rearanged some components used in signing in page
Displays ApplicationPage content in description list.
Updates refresh link on ContentPage, updates Resources screen.
CIAM-1049 Linked Accounts screen PF updates
CIAM-1043-General upstream updates
Updates AccountPage to display form errors.
fix: display Set up Authenticator Application link on large viewport
fix(page structure): rearranges page sections
CIAM-1254/Personal info PF4 updates & Sidebar text updates
updating layouts
updating layout on Signing in and Linked acounts
adding patternfly-additions
adding patternfly-addons styles
Updates Application page based on designs feedback.
moving page description
Updates status label on Applications page to be capitalized.
Updates the copy-fonts script for keycloak.v2 to copy all font directories instead of one.
update Personal info screen - set max width of 600px for form input fields
update Personal info - remove required indicator from input fields
General updates (#2 )
* removed the extra lines being shown
* tweaked general spacing
* general alignment and spacer application
* refactor to get proper alignments without css globals
* forgot to add the conditional on displaying the set up buttons
* try and adjust the alignments
Co-authored-by: zwitter <zwitter@redhat.com>
resolve merge conflicts
Device activity updates (#4 )
* update text to sentence case
* update device info columns to be dynamic across various viewport sizes
* update signed in device layout
* update based on feedback
Co-authored-by: Jon Szeto <jszeto@redhat.com>
Linked accounts update (#3 )
* linked accounts screen - updated icons & Linked/Unlinked Login Providers layout & update text to sentence case
Co-authored-by: Jon Szeto <jszeto@redhat.com>
fixing ts errors
cleaning up fonts and messages
final review updates
message update for Back to admin console link
fixing capitalization on 2fa
updating landing page welcome message
fix: reposition Back to... link
adjusting size for confirm modal
updating spacing and alignment issues
updating resources page
removing unused header class
fixes ts issues and updates node version to match the themes install
npm updates
fixing pf addons
adding chokidar to get babel:watch working
fixing issues from pull request feedback
fixing tests
fixes signingin page test
fixing tests
Co-authored-by: Tyler Andor <tandor@highereducation.com>
2022-04-06 13:00:38 +02:00
Stian Thorgersen
7c64f28934
Change admin console to load keycloak.js using a relative URL ( #11109 )
...
* Change admin console to load keycloak.js using a relative URL
Closes #11108
* fix tests
Co-authored-by: Dominik Guhr <dguhr@redhat.com>
2022-04-06 09:35:26 +02:00
Michal Hajas
44000caaf5
KEYCLOAK-19177 Disable ECP flow by default for all Saml clients; ecp flow creates only transient users sessions
2022-03-31 16:06:44 +02:00
Marek Posolda
aacae9b9ac
Support for frontchannel_logout_session_required OIDC client parameter ( #11009 )
...
* Support for frontchannel_logout_session_required OIDC client parameter
Closes #10137
2022-03-31 14:25:24 +02:00
Eetu Lepistö
66de8adefd
KEYCLOAK-19532 Added finnish locales ( #8569 )
...
Co-authored-by: Antti Leppä <antti.leppa@metatavu.fi>
2022-03-30 14:51:57 -04:00
Marek Posolda
22a16ee899
OIDC RP-Initiated logout endpoint ( #10887 )
...
* OIDC RP-Initiated logout endpoint
Closes #10885
Co-Authored-By: Marek Posolda <mposolda@gmail.com>
* Review feedback
Co-authored-by: Douglas Palmer <dpalmer@redhat.com>
2022-03-30 11:55:26 +02:00
Tamás Bordák
ecd80e6f58
KEYCLOAK-12483 Add missing Hungarian translations
2022-03-25 09:35:46 +01:00
Oskars Pakers
4e9e0563d5
KEYCLOAK-15976 Latvian language adjustments
2022-03-24 10:27:33 +01:00
iingawal
b773857a80
Display email address in login-verify-email.ftl ( #10870 )
...
Closes #8873
2022-03-23 12:44:21 +01:00
keycloak-bot
c71aa8b711
Set version to 999-SNAPSHOT ( #10784 )
2022-03-22 09:22:48 +01:00
Joaquim Fellmann
92c4e6d585
KEYCLOAK-16134 Allow webauthn idless login flow ( #7860 )
...
Closes #10832
2022-03-21 11:37:33 +01:00
Sebastian Rose
99f27497f4
KEYCLOAK-19329 Fix message for access token response claim in admin ui
...
Added missing properties.
Closes #9364
2022-03-17 09:48:29 -03:00
Ivan Atanasov
5c6b123aff
Support for the Recovery codes ( #8730 )
...
Closes #9540
Co-authored-by: Zachary Witter <torquekma@gmail.com>
Co-authored-by: stelewis-redhat <91681638+stelewis-redhat@users.noreply.github.com>
2022-03-10 15:49:25 +01:00
Marcelo Daniel Silva Sales
7335abaf08
Keycloak 10489 support for client secret rotation ( #10603 )
...
Closes #10602
2022-03-09 00:05:14 +01:00
mposolda
d394e51674
Introduce profile 'feature' for step-up authentication enabled by default
...
Closes #10315
2022-03-08 14:42:46 +01:00
mposolda
93bba8e338
Replace 'Store LoA in User Session' with 'Max Age'. Refactoring of step-up authentications related to that.
...
Closes #10205
2022-03-08 10:41:05 +01:00
Jon Koops
beaf8d0348
Remove Node modules from source control ( #9963 )
2022-03-02 08:49:17 +01:00
Jonas Fors Lellky
0353f9d7ae
Adds Swedish translation key for loginAccountTitle
2022-02-25 11:20:15 +01:00
foliengriller
9fd86ac27f
Changes Doctype in base theme to <!DOCTYPE HTML> ( #10271 )
...
Closes : #10157
Co-authored-by: Michael Rosenberger <michael.rosenberger@aeb.com>
2022-02-22 14:40:05 -05:00
Dominik Guhr
9358535161
Fix admin user creation message when calling quarkus welcomepage from remote ( #10362 )
...
For wildfly, everything is as before. For Quarkus, we check if http is enabled and provide the right port and scheme if so, and also we are relative-path aware.
Closes #10335
2022-02-22 08:19:45 +01:00
Marek Posolda
8c3fc5a60e
Option for client to specify default acr level ( #10364 )
...
Closes #10160
2022-02-22 07:54:30 +01:00
Marek Posolda
caf37b1f70
Support for acr_values_supported in OIDC well-known endpoint ( #10265 )
...
* Support for acr_values_supported in OIDC well-known endpoint
closes #10159
2022-02-18 11:33:31 +01:00
Jon Koops
f2ed799b8b
Add profile to conditionally build account2 theme ( #10267 )
...
* Add profile to conditionally build account2 theme
* Use a property for activation instead
2022-02-17 23:10:41 +01:00
Jon Koops
542415dc4d
Modernize TypeScript definitions of JS adapter
2022-02-16 19:52:27 -03:00
Wang Jiaxiang
8938a5be35
Update admin-messages_zh_CN.properties ( #7728 )
2022-02-16 08:44:46 +01:00
Lorent Lempereur
909740ca51
Fix a wrong expiration placeholder in French email translations: emailVerificationBody and emailVerificationBodyHtml
...
Closes #10136
2022-02-15 11:42:24 +01:00
Marek Posolda
90d4e586b6
Show error in case of an unkown essential acr claim. Make sure correc… ( #10088 )
...
* Show error in case of an unkown essential acr claim. Make sure correct acr is set after authentication flow during step-up authentication
Closes #8724
Co-authored-by: Cornelia Lahnsteiner <cornelia.lahnsteiner@prime-sign.com>
Co-authored-by: Martin Bartoš <mabartos@redhat.com>
2022-02-15 09:02:05 +01:00
keycloak-bot
d9f1a9b207
Set version to 18.0.0-SNAPSHOT ( #10165 )
2022-02-11 21:28:06 +01:00
wojnarfilip
f54cd969f8
OTPPolicyTest failures resolve
...
Tests pass locally, Closes #9692
2022-02-11 14:06:17 +01:00
Martin Bartoš
6c09ec6de6
Hide 'unknown' transport media type label for WebAuthn authenticators
...
Closes #10036
2022-02-11 08:28:50 +01:00
Benjamin MENANT
c54920fd0e
fix(themes/keycloak.v2): mixed tags in index.ftl ( #9884 )
...
- SVG spinner missed its closing tag
- spinner wrapper opened 1 div but closed 3
2022-02-09 08:32:13 -05:00
Jon Koops
90fe97133c
Unify package files for JS adapter ( #9789 )
2022-02-08 13:52:46 -05:00
Mauro de Wit
2c238b9f04
session-limiting-feature ( #8260 )
...
Closes #10077
2022-02-08 19:16:06 +01:00
alisonbruno97
d1b64f47fa
Update Portuguese (Brazil) translations #9892 ( #9893 )
2022-02-08 12:35:31 +01:00
Alexander Schwartz
100dbb8781
Rework escaping of special characters in message properties for account console ( #9995 )
...
Closes #9503
2022-02-07 14:47:03 -05:00
Martin Bartoš
5494848f3f
Not possible to register webauthn key on Firefox
...
Closes #10020
2022-02-07 12:21:22 +01:00
Marek Posolda
d9c8cb30a5
Closes #9498 - Fix cases when user is forced to re-authenticate ( #9580 )
2022-02-07 09:02:08 +01:00
Martin Bartoš
d82122b982
Store information about transport media of WebAuthn authenticator
...
Closes #9800
2022-02-04 19:36:30 +01:00
Daniel Gozalo
3528e7ba54
[ fixes #9224 ] - Get consented scopes from AuthorizationContext
...
Always show the consent screen when a dynamic scope is requested and show the requested parameter
Improve the code that handles dynamic scopes consent and add some log traces
Add a test to check how we show dynamic scope in the consent screen and added missing template file change
Fix merge problem in comment and improve other comments
Fix the Dynamic Scope test by assigning it to the client as optional instead of default
Change how dynamic scopes are represented in the consent screen and adapt test
2022-02-02 09:10:20 +01:00
Andreas Rühl
99213ab042
hardcoded string replaced with localization ( #9543 )
...
Co-authored-by: Andreas Ruehl <ar@asuar.de>
2022-01-31 15:15:32 -05:00
Andreas Ruehl
f11b049e52
Missing translation of webauthn-doAuthenticate added
...
closes #9424
2022-01-28 17:48:10 +01:00
Daniel Gozalo
4136bf7700
[ fixes #9750 ] Make sure a Dynamic scope isn't assignable to a client as a default scope, and only show non-dynamic scopes in the available client scopes client menu
2022-01-26 13:32:04 +01:00
Christoph Leistert
e751626ac8
Closes #9418 : Admin UI: sort the realm localization texts alphabetically ( #9419 )
2022-01-21 10:49:22 -05:00
Pedro Igor
4c747047ce
Backward compatibility for lower-case bearer type in token responses ( #9538 )
...
Closes #9537
2022-01-13 08:34:45 +01:00
Jon Koops
dea123169f
KEYCLOAK-14817 Allow JS adapter to be bundled as ES module ( #9351 )
2022-01-13 08:28:30 +01:00
Daniel Gozalo
8ea09d3816
[ fixes #9222 ] - Let users configure Dynamic Client Scopes ( #9327 )
2022-01-12 14:27:24 +01:00
Yoshiyuki Tabata
1ff558bd9e
Closes #9488
2022-01-12 09:06:48 +01:00
Martin Bartoš
8649ca3d50
Multiple active tabs when realm name equals name of the tab in Admin console ( #9438 )
...
Closes #9421
2022-01-11 16:01:28 -05:00
Martin Bartoš
d75d28468e
KEYCLOAK-19490 Add more details about 2FA to authenticate page ( #9252 )
...
Closes #9494
2022-01-11 09:16:22 +01:00
Yoshiyuki Tabata
baad104673
KEYCLOAK-18880 change "look ahead window" to "look around window" ( #9341 )
...
Closes #9340
2022-01-05 20:04:50 +01:00
CorneliaLahnsteiner
dff79cee3c
KEYCLOAK-847 Add support for step up authentication ( #7897 )
...
KEYCLOAK-847 Fix behavior of unknown not essential acr claim
Co-authored-by: Georg Romstorfer <georg.romstorfer@gmail.com>
Co-authored-by: Marek Posolda <mposolda@gmail.com>
2021-12-22 12:43:12 +01:00
Stian Thorgersen
3fe7a50b64
Add profile to include new admin console ( #9283 )
...
Closes #9279
2021-12-22 08:27:33 +01:00
Ben Tatham
f201760a4a
Fixed #8892 "does not exists" language
2021-12-21 20:24:13 +01:00
Yoshiyuki Tabata
db60f56fe8
Translate the title of the login screen into Japanese ( #9266 )
2021-12-21 13:00:17 +01:00
stianst
c6e1ab2d56
Bump PAT used for admin-ui
2021-12-20 10:51:37 +01:00
keycloak-bot
9f3d4a7d42
Set version to 17.0.0-SNAPSHOT
2021-12-20 10:50:39 +01:00
Joaquim Fellmann
cdd5c47ed7
Update french translation for account console
2021-12-15 08:09:50 +01:00
aznamier
04da528b35
KEYCLOAK-19371 - fix for UI crash when logged in user has access to ( #9088 )
...
multiple realms and at the same time that user has only limited role
(eg: view-users) which does not allow to see realm details. Crash was
happening on switching the realm.
2021-12-14 14:10:50 -05:00
Pedro Igor
74970ac043
[ fixes #9128 ] - Enable new admin console to Dist.X
2021-12-14 07:24:03 -08:00
Martin Bartoš
faefeccbee
KEYCLOAK-19487 Test cases for managing 2FA authenticators in account console
2021-12-12 11:36:51 +01:00
Seán McGowan
38174212f9
Fix issue where Patternfly background clashes with Keycloak one ( #8422 )
2021-12-10 15:51:53 -05:00
Martin Bartoš
3c3c33038a
KEYCLOAK-19550 Completely remove Zocial CSS components ( #8581 )
2021-12-10 15:46:28 -05:00
Jon Koops
2d341ddc06
Renew personal access token for installing Admin UI
2021-12-09 14:00:50 +01:00
Martin Bartoš
5283db86c4
KEYCLOAK-19489 Verify WebAuthn settings in admin console
2021-12-08 10:12:48 +01:00
Martin Bartoš
7dc01a5a6e
KEYCLOAK-13319 Use newest WebDriver/Selenium for the WebAuthn testing
2021-12-06 09:42:10 +01:00
Jon Koops
6a766884f6
[KEYCLOAK-17867] Update to latest version of NodeJS and Frontend Plugin ( #7962 )
2021-11-23 15:20:52 -05:00
Martin Bartoš
0d478206eb
KEYCLOAK-18980 Keycloak locale dropdown is active over whole form ( #8561 )
2021-11-22 20:20:37 -05:00
Sony Huang
743abf0fb1
KEYCLOAK-17522 fixed bug that keycloak instance not recognized by Safari ( #7880 )
2021-11-22 20:09:12 -05:00
bal1imb
661aca4452
KEYCLOAK-19283 Implemented new identity provider mapper "Advanced claim to group mapper" alongside tests.
2021-11-19 16:54:39 +01:00
Olivier Boudet
38448f3779
KEYCLOAK-19229 : french translation of emailInstructionUsername
2021-11-19 07:45:16 +01:00
Konstantinos Georgilakis
63c9845cb9
KEYCLOAK-18276 client content screen enhancement
2021-11-18 13:15:02 +01:00
stianst
f6daca8a60
Fix dl of admin-ui
2021-11-16 10:48:56 +01:00
Bruno Oliveira da Silva
2f8c5dd05e
[KEYCLOAK-19616] Update Keycloak themes dependencies for the account and admin console ( #8645 )
2021-11-12 12:30:50 -05:00
Rémy DUTHU
951a232b24
Update messages_es.properties
...
Add `loginAccountTitle` locale to `messages_es.properties`
2021-11-11 12:42:52 +01:00
Thomas Darimont
93d286fdc7
KEYCLOAK-19777 Fix typos in admin-console messages
...
overriden -> overridden
mesasge -> message
Username the Service Account -> Username of the Service Account
Signed-off-by: Thomas Darimont <thomas.darimont@googlemail.com>
2021-11-05 10:06:50 +01:00
mposolda
5740e158e3
KEYCLOAK-18744 OpenBanking Brasil fix for X509 client authentication. More flexibility in Subject DN comparison.
2021-11-05 09:10:50 +01:00
Jon Koops
36f7139bdd
Add new personal access token for installing new Admin UI
2021-10-26 16:03:27 +02:00
Konstantinos Georgilakis
a5c8c45551
KEYCLOAK-19388 correct AttributeConsumingService bug in SAML SP metadata
2021-10-21 20:24:46 +02:00
Miklín Vojtěch
44ec565109
KEYCLOAK-19522: update login messages_cs
2021-10-20 19:13:37 +02:00
OskarsPakers
65ec15efc7
Convert utf8 code to symbols
2021-10-19 15:34:23 +02:00
OskarsPakers
01b92220d2
[feature/KEYCLOAK-15976]: KEYCLOAK-15976 Latvian language support
2021-10-19 15:34:23 +02:00
mposolda
c5432e71ad
KEYCLOAK-19557 Misleading label for client parameter 'Pushed Authorization Request Enabled'
2021-10-15 08:56:20 +02:00
R Yamada
891c8e1a12
[KEYCLOAK-17653] - OIDC Frontchannel logout support
2021-10-07 15:27:19 -03:00
stianst
12157bb66c
KEYCLOAK-19467 Add noopener/noreferrer to links
2021-10-05 15:00:05 +02:00
Thomas Darimont
9e6d6398b9
KEYCLOAK-11364 Revise Service Account roles page ( #7098 )
...
* KEYCLOAK-11364 Add link to service-account user in Service Account roles page
* KEYCLOAK-11364 Revise service-account page
2021-09-30 14:55:44 -04:00
Victor Häggqvist
d92bb7df65
fix typos in sv login messages
2021-09-30 13:34:01 +02:00
Daniel Fesenmeyer
339224578e
KEYCLOAK-10603 adjust assignments to roles (user-role and group-role assignments, client-scope and client "scope mappings"): allow assignments of roles which are already indirectly assigned (e.g. by composite role)
...
- extend RoleMapperModel with method hasDirectRole(RoleModel), which only checks for direct assignment in contrast to the existing method hasRole(RoleModel)
- extend ScopeContainerModel with method hasDirectScope(RoleModel), which only checks for direct scope mapping in contrast to the existing method hasScope(RoleModel)
- use the new hasDirectRole and hasDirectScope methods to check whether a role is in the "available" list and whether it can be assigned (previously, the hasRole method was used for this purpose)
- add hint to UI that available roles contain effectively assigned roles which are not directly assigned
- adjust and extend tests
2021-09-22 13:56:29 +02:00
Nikolas Laskaris
8f09d34272
KEYCLOAK-18288 ( #8096 )
...
RealmsAdminResource now returns also a brief representation (not by default, to be backwards compatible) for realms[] if the appropriate flag is sent.
2021-09-20 15:32:15 -04:00
Vlastimil Elias
28e220fa6d
KEYCLOAK-18497 - Support different input types in built-in dynamic forms
2021-09-20 09:14:49 -03:00
Miklín Vojtěch
78d3e2ebad
KEYCLOAK-19300 Update Czech translation of email messages
2021-09-15 16:59:45 +02:00
Jeswin Simon
daf39e2a63
KEYCLOAK-19281 Added missing closing div tag in login-username template ( #8435 )
2021-09-15 16:52:11 +02:00
Stan Silvert
93e229e45d
KEYCLOAK-18512: Integrate New Admin Console into Keycloak build ( #8366 )
...
* KEYCLOAK-18512: Integrate New Admin Console into Keycloak build
* KEYCLOAK-18512: Integrate New Admin Console into Keycloak build
* Change version to project version. Make experimental.
* Add PAT for reading packages (#12 )
* Add PAT for reading packages
* Encode token
* Use generic GH account for installation of packages
* Enable Github packages repo only for snapshots
* KEYCLOAK-18512: Make ADMIN2 experimental instead of preview
* KEYCLOAK-18512: Remove early return
* KEYCLOAK-18512: Fix formatting issue
Co-authored-by: Jon Koops <jonkoops@gmail.com>
2021-09-15 10:09:06 -04:00
Miklín Vojtěch
24811f1ef5
KEYCLOAK-19288 Update Czech translation of login messages
2021-09-15 15:01:16 +02:00
Marek Posolda
11e5f66c60
KEYCLOAK-19056 EDIT MODE field should not be leave empty ( #8380 )
2021-09-14 20:27:09 +02:00
David Hellwig
a6cd80c933
KEYCLOAK-16076 added new warining when cookies are disabled -with new branch- ( #7632 )
...
* KEYCLOAK-16076 added new warining when cookies are disabled
Co-authored-by: David Hellwig <david.hellwig@bosch.com>
Co-authored-by: Christoph Leistert <christoph.leistert@bosch-si.com>
2021-09-13 11:30:11 +02:00
Olivier Boudet
c7f8544b0c
KEYCLOAK-18454 Reset password : wrong email instructions when duplicates email is allowed
2021-09-02 14:44:18 +02:00
Martin Bartoš
7c243c8427
KEYCLOAK-18590 Save Button Enabled For Empty Attributes
2021-09-01 10:51:20 +02:00
mposolda
3e0f8aed30
KEYCLOAK-19038 Reload user after being updated
2021-08-17 19:28:18 +02:00
Yoshiyuki Tabata
b31b60fffe
KEYCLOAK-18341 Support JWKS OAuth2 Client Metadata in the "by value" key loading method
2021-08-05 16:52:55 +02:00
cedric guindon
1ad34c6ab0
[KEYCLOAK-18498] French i18n contains wrong param
2021-08-03 12:37:13 +02:00
keycloak-bot
262ec3d031
Set version to 16.0.0-SNAPSHOT
2021-07-30 14:56:10 +02:00
Miklín Vojtěch
e44a7af0e4
KEYCLOAK-18913 Update messages_cs.properties
...
Czech translations for base login theme:
themes/src/main/resources-community/theme/base/login/messages/messages_cs.properties
Co-Authored-By: dklika <78177642+dklika@users.noreply.github.com>
Co-Authored-By: Hynek Mlnařík <hmlnarik@users.noreply.github.com>
2021-07-29 21:18:41 +02:00
Vlastimil Elias
32f2f095fe
KEYCLOAK-7724 User Profile default validations
2021-07-29 08:42:37 +02:00
mposolda
4dacbb9e0b
KEYCLOAK-16996 User not able to revoke his offline token for directGrant clients
2021-07-29 08:04:16 +02:00
Pedro Igor
7efc3e8170
[KEYCLOAK-18875] - Minor improvements to attribute group UI
2021-07-28 12:07:39 -03:00
Pedro Igor
ef72343a6a
[KEYCLOAK-18882] - User Profile still tech preview
2021-07-28 08:45:35 +02:00
Joerg Matysiak
acb2ac1c8d
KEYCLOAK-18875 UI for managing group of attributes
2021-07-28 08:42:30 +02:00
mposolda
643b3c4c5a
KEYCLOAK-18594 CIBA Ping Mode
2021-07-27 08:33:17 +02:00
Martin Bartoš
2418e31952
KEYCLOAK-18685 Style in RH-SSO login screen is broken
2021-07-26 11:25:23 +02:00
Joerg Matysiak
9dff21d0a7
KEYCLOAK-18552
...
* added group as attribute metadata
* validation for groups and references to groups
* adapted template to use show attribute groups
* test and integration tests for attribute groups
2021-07-23 09:26:21 -03:00
Luca Leonardo Scorcia
6bd7420907
KEYCLOAK-17290 SAML Client - Generate AttributeConsumingService SP metadata section
2021-07-22 21:53:16 +02:00
Pedro Igor
7f34af4016
Revert "[KEYCLOAK-18425] - Allow mapping user profile attributes"
...
This reverts commit 3e07ca3c
2021-07-20 14:08:09 -03:00
Paulo Mateus
f1ee2826c1
[KEYCLOAK-18805] - Update Portuguese (Brazil) translations
...
- Fix `oauthGrantTitle` typo error
2021-07-20 12:26:29 -03:00
Pedro Igor
396a78bcc4
[KEYCLOAK-18723] - Configurable constraints for request object encryption
2021-07-20 09:28:09 +02:00
Martin Bartoš
8c49478628
KEYCLOAK-18699 Brand logo is not found for admin console ( #8255 )
2021-07-19 12:33:49 -04:00
Daniel Kobras
47f736f819
KEYCLOAK-17646 tool tip for krb5 multi-SPN config
...
The specified server principal is eventually passed to
createJaasConfigurationForServer() in
com.sun.security.auth.module.Krb5LoginModule, which accepts a special value of
'*' to indicate that tickets for all service principals contained in the given
keytab file should be accepted. This is the only way to allow more than one
service principal name (eg. for a multi-homes setup), and this setting is not
obvious without knowledge of the underlying API.
Signed-off-by: Daniel Kobras <kobras@puzzle-itc.de>
2021-07-15 21:10:42 +02:00
Jerome Marchand
108bd91edc
KEYCLOAK-15909 Add sort in tables
2021-07-15 09:39:02 +02:00
Branden Cash
9d0c7ba488
Fix storeToken label association for gitlab idp
2021-07-15 09:31:25 +02:00
Vlastimil Elias
7618e66136
[KEYCLOAK-18541] separate template for IDP review page
2021-07-13 21:43:52 -03:00
Pedro Igor
1baab67f3b
[KEYCLOAK-18630] - Request object encryption support
2021-07-09 11:27:30 -03:00
Pedro Igor
4099833be8
[KEYCLOAK-18693] - Declarative profile validating read-only attribute if it exists
2021-07-08 15:22:02 -03:00
Hryhorii Hevorkian
2803685cd7
KEYCLOAK-18353 Implement Pushed Authorization Request inside the Keycloak
...
Co-authored-by: Takashi Norimatsu <takashi.norimatsu.ws@hitachi.com>
Co-authored-by: mposolda <mposolda@gmail.com>
2021-07-03 08:47:42 +02:00
lbortoli
e5ae113453
KEYCLOAK-18452 FAPI JARM: JWT Secured Authorization Response Mode for OAuth 2.0
2021-07-03 00:00:32 +02:00
Vlastimil Elias
04ff2c327b
[KEYCLOAK-18429] Support a dynamic update profile form
2021-07-02 10:22:47 -03:00
Vlastimil Elias
f32447bcc1
[KEYCLOAK-18424] GUI order for user profile attributes
2021-07-02 08:37:24 -03:00
Pedro Igor
3e07ca3c22
[KEYCLOAK-18425] - Allow mapping user profile attributes
2021-07-01 10:19:28 -03:00
Vlastimil Elias
7af2133924
KEYCLOAK-18542 - User Profile Admin UI - hide unused configurations for
...
username and email attributes
2021-07-01 10:07:08 -03:00
Luca Leonardo Scorcia
ae98d8ea28
KEYCLOAK-18315 SAML Client - Add parameter to request specific AttributeConsumingServiceIndex
2021-06-29 16:22:38 +02:00
Takashi Norimatsu
57c80483bb
KEYCLOAK-17936 FAPI-CIBA : support Signed Authentication Request
...
Co-authored-by: Pritish Joshi <pritish@banfico.com>
Co-authored-by: mposolda <mposolda@gmail.com>
2021-06-29 08:07:40 +02:00
Pedro Igor
948f453e2d
[KEYCLOAK-18427] - Allowing switching to declarative provider
2021-06-28 15:50:04 -03:00
Vlastimil Elias
512bcd14f7
[KEYCLOAK-18428] - dynamic registration form
2021-06-25 17:11:15 -03:00
Benjamin Weimer
6e4a0044fd
KEYCLOAK-15371 Dont show backchannel logout options for bearer only clients in admin ui
2021-06-24 14:13:32 -03:00
Pedro Igor
faadb896ea
[KEYCLOAK-18426] - Support required by role and scopes in Admin UI
2021-06-24 10:43:49 -03:00
Yoshiyuki Tabata
52ced98f92
KEYCLOAK-18503 Regex Policy for authorization service
2021-06-24 08:49:41 -03:00
Vlastimil Elias
b7a4fd8745
KEYCLOAK-18423 - Support a user-friendly name property for user profile
...
attributes
2021-06-24 08:17:06 -03:00
Clement Cureau
b102c892fa
[KEYCLOAK-14046] Allow finegrain group admins to create users in console
...
- enable "Create" button and "Save" button in Admin Console Users views (list
and details)
The flag used to enable those button is computed as follow, since there's no computed flag
from backend on "admin user has fine grain admin permission on at least 1 group" :
== (existing condition) || (feature "finegrain admin" is enabled && access.queryUsers)
If the admin user hasn't the correct permission on the right groups for the new user he's
trying to create, backend will forbid the creation by returning a 403
This change is following PR #7035 , which added the Groups field in the User creation form
2021-06-22 18:26:31 -03:00
Vlastimil Elias
82491ae5d2
KEYCLOAK-17446 - Prefill username in "Forgot Your Password" form if
...
called from Login form
2021-06-22 08:48:43 -03:00
rmartinc
b8452374d2
[KEYCLOAK-18473] Add max length to password policy
2021-06-22 10:15:48 +02:00
keycloak-bot
13f7831a77
Set version to 15.0.0-SNAPSHOT
2021-06-18 10:42:27 +02:00
Pedro Igor
ef3a0ee06c
[KEYCLOAK-17399] - Declarative User Profile and UI
...
Co-authored-by: Vlastimil Elias <velias@redhat.com>
2021-06-14 11:28:32 +02:00
Stan Silvert
b152d89e22
KEYCLOAK-18373: Cut and Paste in Groups broken
2021-06-10 08:33:42 +02:00
Martin Bartoš
07d57ca30f
KEYCLOAK-17179 IdP mappers with MultiValued property can't be saved
2021-06-10 07:02:21 +02:00
Gregor Tudan
628274dee2
KEYCLOAK-16075: always show the register-button during webauthn-registration.
...
Safari will fail to register if the action has not been triggered by a user gesture.
2021-06-01 10:48:16 +02:00
Gregor Tudan
14407a631c
KEYCLOAK-16075: show a button instead of logging in automatically with WebAuthn onLoad.
...
Safari will fail to use TouchID/FaceID if it is not triggered by an explicit user interaction. There is an open discussion in the WebAuthn-Spec to make this a mandatory behavior and quiet a few other auth-servers have adopted this behavior.
2021-06-01 10:48:16 +02:00
Václav Muzikář
20b29f7b99
UI fixes
2021-05-31 12:31:52 +02:00
mposolda
73a38997d8
KEYCLOAK-14208 Default client profiles for FAPI
2021-05-31 12:31:52 +02:00
mposolda
6e139b8fda
KEYCLOAK-18280 Issues with boolean properties of executors
2021-05-31 12:31:52 +02:00
Stian Thorgersen
2cb59e2503
KEYCLOAK-17844 Add option to disable authorization services to workaround issues with many clients
2021-05-27 22:28:56 +02:00
Yoshiyuki Tabata
c52d0babce
KEYCLOAK-17491 Move the key settings to the new Keys tab
2021-05-27 15:26:40 +02:00
Takashi Norimatsu
6532baa9a7
KEYCLOAK-18127 Option for skip return user's claims in the ID Token for hybrid flow
2021-05-24 08:02:34 +02:00
Michito Okai
cc2d6f0741
KEYCLOAK-18235 Display of options about device grant when selecting
...
"public" as the access type
2021-05-21 08:24:27 +02:00
Vlastimil Elias
4ad1687f2b
[KEYCLOAK-17399] UserProfile SPI - Validation SPI integration
2021-05-20 15:26:17 -03:00
Václav Muzikář
7c2341f1ed
KEYCLOAK-18041 Client Policy UI Improvements: Action column for built-in profile
2021-05-20 16:38:26 +02:00
Václav Muzikář
d0f01740be
KEYCLOAK-18043 Client Policy UI Improvements: Navigation
2021-05-20 07:54:53 +02:00
Vlastimil Eliáš
0913a22c30
KEYCLOAK-2045 Simple Validation SPI for UserProfile SPI ( #8053 )
...
* KEYCLOAK-2045 Simple Validation API
Co-authored-by: Thomas Darimont <thomas.darimont@googlemail.com>
2021-05-19 13:57:34 -03:00
Václav Muzikář
23fef24fe1
KEYCLOAK-18042 Client Policy UI Improvements: Add delete confirmation modal dialog
2021-05-19 11:57:14 +02:00
Václav Muzikář
65fbf3f68c
KEYCLOAK-18079 Client Policy UI Improvements: JSON error handling
2021-05-18 16:12:48 +02:00
mposolda
b8a7750000
KEYCLOAK-18113 Refactor some executor/condition provider IDs
2021-05-18 09:17:41 +02:00
Nikolas Laskaris
35601aaaba
KEYCLOAK-17140 ( #7781 )
2021-05-17 14:49:26 -04:00
Pedro Igor
62e17f3be7
[KEYCLOAK-17588] - Authz confirmation popping out twice
2021-05-14 07:21:06 -03:00
Bruno Oliveira da Silva
a6ab3119d6
[KEYCLOAK-18059] Upgrade dev dependencies for the new Account Console ( #8020 )
2021-05-13 19:37:22 -04:00
Marek Posolda
a6d4316084
KEYCLOAK-14209 Client policies admin console support. Changing of format of JSON for client policies and profiles. Remove support for default policies ( #7969 )
...
* KEYCLOAK-14209 KEYCLOAK-17988 Client policies admin console support. Changing of format of JSON for client policies and profiles. Refactoring based on feedback and remove builtin policies
2021-05-12 16:19:55 +02:00
Erik Jan de Wit
e318d24301
KEYCLOAK-17098 use open boolean per section for mobile kebab ( #7949 )
2021-05-06 09:11:35 -04:00
keycloak-bot
4b44f7d566
Set version to 14.0.0-SNAPSHOT
2021-05-06 14:55:01 +02:00
rmartinc
7de5e7d298
KEYCLOAK-17074 Infinite loop logging as an user or impersonating an user as admin ( #7799 )
2021-05-03 21:05:12 -04:00
Christoph Leistert
b75648bda2
KEYCLOAK-17284 Evaluate ID-Token and UserInfo-Endpoint:
...
- add additional REST endpoints for evaluation:
- for ID Token: GET /realm/clients/id/evaluate-scopes/generate-example-id-token
- for UserInfo-Endpoint: GET /realm/clients/id/evaluate-scopes/generate-example-userinfo
- extend UI: add additional tabs "Generated ID Token" and "Generated User Info" to the client scopes evaluation screen
Co-authored-by: Daniel Fesenmeyer <daniel.fesenmeyer@bosch.io>
2021-04-29 16:45:30 +02:00
Takashi Norimatsu
65c48a4183
KEYCLOAK-12137 OpenID Connect Client Initiated Backchannel Authentication (CIBA) ( #7679 )
...
* KEYCLOAK-12137 OpenID Connect Client Initiated Backchannel Authentication (CIBA)
Co-authored-by: Andrii Murashkin <amu@adorsys.com.ua>
Co-authored-by: Christophe Lannoy <c4r1570p4e@gmail.com>
Co-authored-by: Pedro Igor <pigor.craveiro@gmail.com>
Co-authored-by: mposolda <mposolda@gmail.com>
2021-04-29 15:56:39 +02:00
Yoshiyuki Tabata
45202bd49a
KEYCLOAK-17637 Client Scope Policy for authorization service
2021-04-26 08:58:33 -03:00
Réda Housni Alaoui
ae9df51438
KEYCLOAK-17608 Missing french translation for loginAccountTitle
2021-04-23 10:15:26 +02:00
i7a7467
ada7f37430
KEYCLOAK-16918 Set custom user attribute to Name ID Format for a SAML client
...
https://issues.redhat.com/browse/KEYCLOAK-16918
Co-authored-by: Michal Hajas <mhajas@redhat.com>
2021-04-20 10:29:17 +02:00
AlistairDoswald
8b3e77bf81
KEYCLOAK-9992 Support for ARTIFACT binding in server to client communication
...
Co-authored-by: AlistairDoswald <alistair.doswald@elca.ch>
Co-authored-by: harture <harture414@gmail.com>
Co-authored-by: Michal Hajas <mhajas@redhat.com>
2021-04-16 12:15:59 +02:00
Martin Bartoš
5a9068e732
KEYCLOAK-16401 Deny/Allow access in a conditional context
2021-04-09 12:04:45 +02:00
Michito Okai
d9ebbe4958
KEYCLOAK-17202 Restrict Issuance of Refresh tokens to specific clients
2021-04-08 11:51:25 +02:00
Martin Bartoš
f203e4808d
KEYCLOAK-16898 Locale dropdown is broken in IE11 ( #7808 )
2021-04-06 10:23:39 +02:00
Konstantinos Georgilakis
ec5c256562
KEYCLOAK-5657 Support for transient NameIDPolicy and AllowCreate in SAML IdP
2021-03-31 14:45:39 +02:00
Bodo Graumann
0033b7daf7
[KEYCLOAK-17166] Use radio buttons for otp select
2021-03-29 15:46:34 +02:00
Stan Silvert
717d9515fa
KEYCLOAK-16890: Stored XSS attack on new acct console ( #7867 )
2021-03-22 11:24:12 +01:00
Stan Silvert
3b80eee5bf
KEYCLOAK-17033: Reflected XSS attack with referrer in new account
...
console
2021-03-22 11:22:23 +01:00
Katharina Marzok
6e3dbfcb3d
KEYCLOAK-16660 Fix typo in 'applicationName'
2021-03-22 11:18:10 +01:00
Clement Cureau
0b68f24a09
[KEYCLOAK-14046] Include groups in user creation via Admin Console ( #7035 )
...
* [KEYCLOAK-14046] Include groups in user creation via Admin Console
Since the POST /users API now supports providing groups membership, here is the UI
part!
- Added a field in the user creation UI to specify groups the newly created user
will be joining
- Added associated messages in english language
* Added UI integration tests
* Fixed UI tests
* Flatten nested groups in user creation groups searchbox
* Filtering out searched groups
* Removed unused injection
* Fixed UI tests
Co-authored-by: Clement Cureau <clement.cureau@cdiscount.com>
2021-03-19 13:55:45 +01:00
Michito Okai
298ab0bc3e
KEYCLOAK-7675 Support for Device Authorization Grant
2021-03-15 10:09:20 -03:00
Hiroyuki Wada
9d57b88dba
KEYCLOAK-7675 Prototype Implementation of Device Authorization Grant.
...
Author: Hiroyuki Wada <h2-wada@nri.co.jp>
Date: Thu May 2 00:22:24 2019 +0900
Signed-off-by: Łukasz Dywicki <luke@code-house.org>
2021-03-15 10:09:20 -03:00
Douglas Palmer
852593310f
[KEYCLOAK-14913] GitLab Identity Provider shouldn't request for 'api' scope
2021-03-05 14:23:34 +01:00
i7a7467
b83064b142
KEYCLOAK-16679 Add algorithm settings for client assertion signature in OIDC identity broker
2021-03-01 18:11:25 +01:00
Eric Rodrigues Pires
37cb1ba310
[KEYCLOAK-17170] Update Portuguese (Brazil) translations
...
- Update `account`, `email`, and `login` components of the `base` theme
- Update `account` component of the `keycloak.v2` theme
2021-02-22 10:17:04 -03:00
diodfr
cb12fed96e
KEYCLOAK-4544 Detect existing user before granting user autolink
2021-02-11 11:06:49 +01:00
i7a7467
b1a16e4654
KEYCLOAK-17075 The tooltip for "Use PKCE" in Identity Provider is not displayed correctly
...
https://issues.redhat.com/browse/KEYCLOAK-17075
2021-02-11 11:03:29 +01:00
Boris Stumm
c0beca7744
KEYCLOAK-16832: using realm name instead of id
...
in order to get localization texts
2021-01-29 11:40:05 -03:00
sirkrypt0
6e9722b446
KEYCLOAK-16803 Update German translations
2021-01-21 09:51:16 +01:00
Martin Bartoš
3de53f6488
KEYCLOAK-15846 Upgrade locale dropdown to PF4 ( #7644 )
2021-01-20 14:21:30 -05:00
Tomas Kyjovsky
dd4adc231d
KEYCLOAK-16683 removing reference to a nonexistent resource in the login theme ( #7692 )
2021-01-20 13:39:26 -05:00
zywj
8cbfeef5b5
KEYCLOAK-16870 Translation error
...
`登陆` means `landing`
`登录` means `login`
2021-01-20 15:34:46 +01:00
mposolda
dae4a3eaf2
KEYCLOAK-16468 Support for deny list of metadata attributes not updateable by account REST and admin REST
...
(cherry picked from commit 79db549c9d561b8d5efe3596370190c4da47e4e1)
(cherry picked from commit bf4401cddd5d3b0033820b1cb4904bd1c8b56db9)
2021-01-18 13:17:51 +01:00
mposolda
eac3329d22
KEYCLOAK-14019 Improvements for request_uri parameter
...
(cherry picked from commit da38b36297a5bd9890f7df031696b516268d6cff)
2021-01-18 13:05:09 +01:00
n0emis
10294f4e2b
KEYCLOAK-16660: Fix typo in translation-string for account.v2 ( #7687 )
2021-01-13 10:56:56 -05:00
mildis
de09bdf32d
messages_fr to use linkExpirationFormatter
2021-01-12 21:15:38 +01:00
moritz.hilberg
70a20ef50d
KEYCLOAK-16566 Display Idp displayName if available
2021-01-12 20:56:18 +01:00
ltressens
0fecf1546a
KEYCLOAK-16790 Attempt to translate 'impersonate'
2021-01-12 20:30:59 +01:00
vramik
1402d021de
KEYCLOAK-14846 Default roles processing
2021-01-08 13:55:48 +01:00
Thomas Darimont
1a7600e356
KEYCLOAK-13923 Support PKCE for OIDC based Identity Providers ( #7381 )
...
* KEYCLOAK-13923 - Support PKCE for Identity Provider
We now support usage of PKCE for OIDC based Identity Providers.
* KEYCLOAK-13923 Warn if PKCE information cannot be found code-to-token request in OIDCIdentityProvider
* KEYCLOAK-13923 Pull up PKCE handling from OIDC to OAuth IdentityProvider infrastructure
* KEYCLOAK-13923 Adding test for PKCE support for OAuth Identity providers
* KEYCLOAK-13923 Use URI from KeycloakContext instead of HttpRequest
Co-authored-by: Pedro Igor <pigor.craveiro@gmail.com>
Co-authored-by: Pedro Igor <pigor.craveiro@gmail.com>
2021-01-05 10:59:59 -03:00
Réda Housni Alaoui
24522c298e
KEYCLOAK-16657 New Account Console: missing french translation ( #7688 )
2021-01-04 14:17:53 -05:00
Réda Housni Alaoui
c917ae5ded
KEYCLOAK-16652 New Account Console: When langage is not english, no user name displayed at the upper right
2021-01-04 09:04:46 -05:00
keycloak-bot
75be33ccad
Set version to 13.0.0-SNAPSHOT
2020-12-16 17:31:55 +01:00
Fabricio Oliveira
019f27abdb
Correct label is 'Dependent Permissions' ( #7672 )
...
The label refers to the list 'permissions' dependent on the 'policy'.
2020-12-16 07:59:29 -03:00
Przemyslaw Sztoch
33ec2fe069
KEYCLOAK-14492 More polish translation and fixed language name translation
...
Language name should not be translated!
You search your language name in native.
New messages for lack fields from OpenID connect scopes.
2020-12-07 08:36:08 +01:00
Peter Zaoral
c8a2f82a50
KEYCLOAK-14138 Upgrade OTP login screen
...
* edited related css and ftl theme resources
* added tile component
* fixed IE11 compatibility
* fixed affected tests
Signed-off-by: Peter Zaoral <pzaoral@redhat.com>
2020-12-03 16:00:36 +01:00
Joaquim Fellmann
6a6dba5d6e
KEYCLOAK-15634: Prevent federated user removal with new account console
2020-11-27 13:44:36 +01:00
Peter Zaoral
ad940a861a
KEYCLOAK-14137 Upgrade Authentication selector screen
...
* edited related css and ftl theme resources
* added IE11 compatibility support
* fixed affected tests
Signed-off-by: Peter Zaoral <pzaoral@redhat.com>
2020-11-27 08:40:06 +01:00
zak905
4f330f4a57
KEYCLOAK-953: add allowing user to delete his own account feature
2020-11-24 15:50:07 +01:00
Stan Silvert
0afd55f32c
KEYCLOAK-14547: Make New Account Console the default.
2020-11-23 20:56:05 +01:00
Stan Silvert
36fa3d555a
KEYCLOAK-16354: Update serialize-javascript dependency
2020-11-23 14:40:16 +01:00
Martin Bartos
ab347df5ee
KEYCLOAK-14915 Upgrade registration screen to PF4
2020-11-18 10:54:17 +01:00
vmuzikar
01be601dbd
KEYCLOAK-14306 OIDC redirect_uri allows dangerous schemes resulting in potential XSS
...
(cherry picked from commit e86bec81744707f270230b5da40e02a7aba17830)
Conflicts:
testsuite/integration-arquillian/tests/base/src/test/java/org/keycloak/testsuite/client/ClientRegistrationTest.java
testsuite/integration-arquillian/tests/base/src/test/java/org/keycloak/testsuite/admin/ClientTest.java
services/src/main/java/org/keycloak/validation/DefaultClientValidationProvider.java
2020-11-12 08:21:54 +01:00
rmartinc
e6bd12b174
[KEYCLOAK-16139] Serialize the calls for groups tab on admin console
2020-11-10 15:41:16 +01:00
Thomas Darimont
de20830412
KEYCLOAK-9551 KEYCLOAK-16159 Make refresh_token generation for client_credentials optional. Support for revocation of access tokens.
...
Co-authored-by: mposolda <mposolda@gmail.com>
2020-11-06 09:15:34 +01:00
Martin Bartos
7522d5ac74
KEYCLOAK-15841 Upgrade rest of the minor forms to PF4
2020-11-05 17:58:41 +01:00
Peter Zaoral
4fbc6389b5
KEYCLOAK-15386 Some icons are not displayed properly
...
* pficon.woff/woff2 - updated PatternFly font resource
* pficon.css - css that contains @font-face rule
Signed-off-by: Peter Zaoral <pzaoral@redhat.com>
2020-11-02 20:21:38 +01:00
Christoph Leistert
e131de9574
KEYCLOAK-14855 Added realm-specific localization texts which affect texts in every part of the UI (admin console / login page / personal info page / email templates). Also new API endpoints and a new UI screen to manage the realm-specific localization texts were introduced.
...
Co-authored-by: Daniel Fesenmeyer <daniel.fesenmeyer@bosch.io>
2020-10-30 08:02:43 -03:00
Martin Bartos
2e59d5c232
KEYCLOAK-14679 Unable to log in with WebAuthn on unsupported browsers
2020-10-29 14:03:17 +01:00
Martin Bartos
a8df7d88a1
[KEYCLOAK-14139] Upgrade login screen to PF4
2020-10-27 20:24:07 +01:00
Grandys
c122e72178
[KEYCLOAK-15850] Removed references to unminimized versions of javascript libraries in base admin template
2020-10-23 10:57:32 +02:00
Roland Werner
d544b132f9
KEYCLOAK-15806:
...
Extension to SignatureAlgorithm to support more Algorithms (RSA_SHA256_MGF1, RSA_SHA512_MGF1).
Also included in clients.js and realms.js so it can be chosen as signature algorithm when connecting as SAML client and when brokering through SAML.
2020-10-15 20:55:27 +02:00
Jonathan Buzzetti
a2efb84e00
KEYCLOAK-15978 Update spanish email verification message
...
For it to be similar to its english counterpart
2020-10-15 16:46:24 +02:00
Luca Leonardo Scorcia
0621e4ceb9
KEYCLOAK-15697 Fix config entry tooltip
2020-10-14 07:39:49 +02:00
Elisabeth Schulz
4c4750f1d9
KEYCLOAK-13983 Include algorithm parameters
...
Restore accidental change
2020-10-12 10:12:01 +02:00
Elisabeth Schulz
9143bc748f
KEYCLOAK-13983 Include algorithm parameters
...
Include suggestions made by @mposolda to enable more generic
usage
2020-10-12 10:12:01 +02:00
Luca Leonardo Scorcia
f274ec447b
KEYCLOAK-15697 Make the Service Provider Entity ID user configurable
2020-10-09 22:04:02 +02:00
vmuzikar
790b549cf9
KEYCLOAK-15262 Logout all sessions after password change
2020-09-18 20:09:40 -03:00
Luca Leonardo Scorcia
c6608c1561
KEYCLOAK-15383 Translation strings escaped twice in saml-post-form.ftl
2020-09-16 21:31:51 +02:00
Luca Leonardo Scorcia
10077b1efe
KEYCLOAK-15485 Add option to enable SAML SP metadata signature
2020-09-16 16:40:45 +02:00
Joaquim Fellmann
be4780243b
KEYCLOAK-15483 Replace badly displayed HTML message with simple text message for french locale (align with en, de, pt, po, tr, nl locales)
2020-09-15 17:09:53 -04:00
Stan Silvert
952e8fecee
KEYCLOAK-15481: Display forbidden screen
2020-09-11 07:03:24 -04:00
Clement Cureau
73378df52e
[KEYCLOAK-11621] Allow user creation via group permissions (Admin API)
...
Problem:
Using fine-grained admin permissions on groups, it is not permitted to create new users
within a group.
Cause:
The POST /{realm}/users API does not check permission for each group part of the new
user representation
Solution:
- Change access logic for POST /{realm}/users to require MANAGE_MEMBERS and
MANAGE_MEMBERSHIP permissions on each of the incoming groups
Tests:
Manual API testing performed:
1. admin user from master realm:
- POST /{realm}/users without groups => HTTP 201 user created
- POST /{realm}/users with groups => HTTP 201 user created
2. user with MANAGE_MEMBERS & MANAGE_MEMBERSHIP permissions on group1
- POST /{realm}/users without groups => HTTP 403 user NOT created
- POST /{realm}/users with group1 => HTTP 201 user created
- POST /{realm}/users with group1 & group2 => HTTP 403 user NOT created
- POST /{realm}/users with group1 & wrong group path => HTTP 400 user NOT created
3. user with MANAGE_MEMBERS permission on group1
- POST /{realm}/users without groups => HTTP 403 user NOT created
- POST /{realm}/users with group1 => HTTP 403 user NOT created
- POST /{realm}/users with group1 & group2 => HTTP 403 user NOT created
- POST /{realm}/users with group1 & wrong group path => HTTP 400 user NOT created
2020-09-10 12:26:55 -03:00
Luca Leonardo Scorcia
67b2d5ffdd
KEYCLOAK-14961 SAML Client: Add ability to request specific AuthnContexts to remote IdPs
2020-09-03 21:25:36 +02:00
Simon Legner
bed664e4fe
KEYCLOAK-15186 Sort user federation table
2020-09-02 17:40:41 -04:00
stianst
a92bf0c3be
KEYCLOAK-15091 Fix issue with custom favicon.ico
2020-09-02 23:18:49 +02:00
Konstantinos Georgilakis
1fa93db1b4
KEYCLOAK-14304 Enhance SAML Identity Provider Metadata processing
2020-09-02 20:43:09 +02:00
Takashi Norimatsu
aad3bdcb88
KEYCLOAK-15251 keycloak-themes build fails in windows
2020-09-02 12:40:07 -04:00
testn
0362d3a430
KEYCLOAK-15113: Move away from deprecated Promise.success()/error()
2020-09-01 14:26:44 -04:00
Iavael
f021f72fcd
[KEYCLOAK-14663] Fix spelling in RU translation
...
https://en.wiktionary.org/wiki/%D0%BF%D1%80%D0%B8%D0%B2%D0%B8%D0%BB%D0%B5%D0%B3%D0%B8%D1%8F
2020-09-01 12:01:13 +02:00
Jon Koops
b64cf3c315
KEYCLOAK-14980 Remove references to Bower
2020-09-01 11:49:58 +02:00
Luca Leonardo Scorcia
03c07bd2d7
KEYCLOAK-14902 Replace SAML SP metadata export with link to descriptor
2020-08-31 22:26:30 +02:00
Martin Bartos
9c847ab176
[KEYCLOAK-14432] Unhandled NPE in identity broker auth response
2020-08-31 14:14:42 +02:00
kaibo-ondruska
6d45d715d3
KEYCLOAK-15369 fix Czech translation
...
"Přihlasovací" should be "Přihlašovací"
2020-08-28 14:54:50 +02:00
Thomas Darimont
0f967b7acb
KEYCLOAK-12729 Add password policy not-email
...
Added test cases and initial translations
2020-08-21 14:55:07 +02:00