Pedro Igor
87f30a6285
Adding a config to the UPDATE_EMAIL action to force users to verify email
...
Closes #32569
Signed-off-by: Pedro Igor <pigor.craveiro@gmail.com>
2025-07-16 16:21:08 +02:00
mposolda
274afa88fa
Add option 'Requires short state parameter' to OIDC IDP
...
closes #40237
Signed-off-by: mposolda <mposolda@gmail.com>
2025-07-11 16:17:03 +02:00
Pascal Knüppel
f39a37d8d1
[OID4VCI] Move realm attributes to clientScope and protocol-mappers ( #39768 )
...
fixes #39527
Signed-off-by: Pascal Knüppel <pascal.knueppel@governikus.de>
Signed-off-by: Captain-P-Goldfish <captain.p.goldfish@gmx.de>
2025-07-10 14:46:36 +02:00
Pedro Ruivo
9322d71d61
UserSession Offline removed from DB if not in cache
...
Fixes #40754
Signed-off-by: Pedro Ruivo <pruivo@redhat.com>
Signed-off-by: Alexander Schwartz <alexander.schwartz@gmx.net>
Co-authored-by: Alexander Schwartz <alexander.schwartz@gmx.net>
2025-07-07 20:52:06 +02:00
Ricardo Martin
8624101701
Documentation changes for Passkeys ( #40728 )
...
Closes #40705
Signed-off-by: rmartinc <rmartinc@redhat.com>
Co-authored-by: Alexander Schwartz <alexander.schwartz@gmx.net>
Signed-off-by: Ricardo Martin <rmartinc@redhat.com>
2025-06-27 14:59:46 +02:00
andymunro
e7b4f745ad
Clarify OpenShift instructions ( #40488 )
...
Closes #40487
Signed-off-by: AndyMunro <amunro@redhat.com>
2025-06-20 17:07:48 +02:00
Henrik S.
c952cb66ad
Update authentication flows documentation to match new GUI
...
Closes #40514
Signed-off-by: Henrik S. <henrik.strath@volvocars.com>
Signed-off-by: Alexander Schwartz <aschwart@redhat.com>
Co-authored-by: Alexander Schwartz <aschwart@redhat.com>
2025-06-16 08:24:43 +00:00
Steven Hawkins
76bc9fadcb
fix: adding a -- separator for spi options ( #40005 )
...
* fix: adding a -- separator for spi options
closes : #39063
Signed-off-by: Steve Hawkins <shawkins@redhat.com>
* adding a warning for ambiguous spi options
also adding a note about the change
Signed-off-by: Steve Hawkins <shawkins@redhat.com>
# Conflicts:
# docs/documentation/upgrading/topics/changes/changes-26_3_0.adoc
* updating docs to the new format
Signed-off-by: Steve Hawkins <shawkins@redhat.com>
# Conflicts:
# docs/guides/high-availability/examples/generated/keycloak-ispn.yaml
# docs/guides/high-availability/examples/generated/keycloak.yaml
* internally using the new spi options
also adding a deprecation notice
Signed-off-by: Steve Hawkins <shawkins@redhat.com>
* Apply suggestions from code review
Co-authored-by: Martin Bartoš <mabartos@redhat.com>
Signed-off-by: Steven Hawkins <shawkins@redhat.com>
* correcting options output
adding + + inlining where needed
Signed-off-by: Steve Hawkins <shawkins@redhat.com>
* adding test showing the env mapping with __
Signed-off-by: Steve Hawkins <shawkins@redhat.com>
---------
Signed-off-by: Steve Hawkins <shawkins@redhat.com>
Signed-off-by: Steven Hawkins <shawkins@redhat.com>
Co-authored-by: Martin Bartoš <mabartos@redhat.com>
2025-06-13 16:13:53 +02:00
Ricardo Martin
b89f8a0225
Documentation changes for the 2FA additions
...
Closes #40001
Signed-off-by: rmartinc <rmartinc@redhat.com>
2025-06-12 09:30:27 +02:00
mposolda
b03b9f9e3a
Improve documentation of service-accounts and make it more clear. Delete the unused file service-accounts.adoc
...
closes #39748
Signed-off-by: mposolda <mposolda@gmail.com>
2025-06-05 08:45:12 +02:00
Pedro Igor
7cc055f8a6
Verify brokered user email based on the email_verified claim from the ID Token returned by the OP
...
Closes #39885
Signed-off-by: Pedro Igor <pigor.craveiro@gmail.com>
2025-05-29 10:45:18 -03:00
Pedro Igor
e6e6fa60fa
Adding OAuth2-based identity broker
...
Closes #35266
Signed-off-by: Pedro Igor <pigor.craveiro@gmail.com>
2025-05-27 12:07:01 -03:00
rmartinc
3c511635ba
Skip AIA for webauthn register if a crendential of teh correct type already exists
...
Closes #39191
Signed-off-by: rmartinc <rmartinc@redhat.com>
2025-05-20 18:09:12 +02:00
Kai J. Witt
c76bb0683c
Make max auth age configurable for all required actions by default
...
Moved the current configuration implementation for the update password
Closes #39408
Signed-off-by: Kai Josef Witt <KWitt@vhv.de>
Signed-off-by: Marek Posolda <mposolda@gmail.com>
Co-authored-by: Kai Josef Witt <KWitt@vhv.de>
Co-authored-by: Marek Posolda <mposolda@gmail.com>
2025-05-15 08:44:38 +02:00
Awambeng
ea4ef74917
Fix doc(oid4vc): Correct realm-attributes example and update HTTP method in docs ( #39409 )
...
Closes #39264
Signed-off-by: Awambeng Rodrick <awambengrodrick@gmail.com>
2025-05-13 10:09:14 +02:00
rmartinc
4730dbdd8d
Make recovery codes supported
...
Closes #38994
Signed-off-by: rmartinc <rmartinc@redhat.com>
2025-04-29 10:25:46 +02:00
mposolda
e9283ee71d
Documentation for recovery codes (deprecation of password policy and required action config)
...
closes #39245
Signed-off-by: mposolda <mposolda@gmail.com>
2025-04-29 09:29:38 +02:00
Emmanuel Lécharny
a48469896e
Added a link to the ApacheDS doc for server side password hashing
...
Closes #39136
Signed-off-by: Emmanuel Lécharny <elecharny@gmail.com>
2025-04-24 09:25:03 +00:00
Emmanuel Lécharny
1dc97d5d4d
Update ldap.adoc with ApacheDS details
...
Added some precision about ApacheDS password management.
Closes #39136
Signed-off-by: Emmanuel Lécharny <elecharny@apache.org>
Signed-off-by: Alexander Schwartz <alexander.schwartz@gmx.net>
Co-authored-by: Alexander Schwartz <alexander.schwartz@gmx.net>
2025-04-23 07:55:59 +02:00
Marek Posolda
f8a4a8da86
Unexpected AIA Cause Server Errors
...
closes #37526
Signed-off-by: mposolda <mposolda@gmail.com>
2025-04-17 14:15:07 +00:00
Pedro Igor
1ba8fe16ac
Deprecate for removal Instagram Identity Broker ( #38998 )
...
Closes #37967
Closes #36562
Signed-off-by: Pedro Igor <pigor.craveiro@gmail.com>
2025-04-17 09:07:06 +02:00
Pedro Igor
288b6dae12
More information to docs
...
Closes #38798
Signed-off-by: Pedro Igor <pigor.craveiro@gmail.com>
2025-04-10 20:03:05 +02:00
Pedro Igor
ae88d7921f
Improvements to partial evaluation
...
Closes #38732
Signed-off-by: Pedro Igor <pigor.craveiro@gmail.com>
2025-04-09 18:15:28 +02:00
Pedro Igor
87430fc181
Add impersonate-members scope to group resource type
...
Closes #38566
Signed-off-by: Pedro Igor <pigor.craveiro@gmail.com>
2025-04-07 14:56:27 +00:00
vramik
6488890585
[FGAP:V2] remove configure scope from Client resource type
...
Closes #38567
Signed-off-by: vramik <vramik@redhat.com>
2025-04-07 07:05:02 -03:00
Stefan Guilhen
c4c3e2eee6
Allow redirection to idp when user email matches any of the org domains
...
Signed-off-by: Stefan Guilhen <sguilhen@redhat.com>
Co-authored-by: Martin Panzer <martin.panzer@active-logistics.com>
Closes #33804
2025-04-04 11:28:04 -03:00
Vlasta Ramik
18c8308bb4
[FGAP] Remove redundant sentense from fine grained admin permissions docs
...
Closes #38677
Signed-off-by: vramik <vramik@redhat.com>
2025-04-04 09:41:17 +02:00
vramik
f076b99407
FGAP documentation
...
Closes #37245
Signed-off-by: vramik <vramik@redhat.com>
2025-04-03 09:44:32 -03:00
Marek Posolda
6654e56a7c
Polish documentation for audience and client scopes ( #38484 )
...
closes #19127
Signed-off-by: mposolda <mposolda@gmail.com>
Co-authored-by: Bruno Oliveira da Silva <bruno@abstractj.com>
Signed-off-by: Marek Posolda <mposolda@gmail.com>
2025-04-03 08:43:06 +02:00
rmartinc
a10c8119d4
Define a max expiration window for Signed JWT client authentication
...
Closes #38576
Signed-off-by: rmartinc <rmartinc@redhat.com>
2025-04-02 18:32:54 +02:00
Alexander Schwartz
e7474646ee
Explicit target for cross-reference 2FA in server admin guide ( #38573 )
...
Closes #38572
Signed-off-by: Alexander Schwartz <aschwart@redhat.com>
2025-04-01 13:29:30 +02:00
mposolda
cd4e5bc784
Release notes for oid4vci docs
...
closes #38485
Signed-off-by: mposolda <mposolda@gmail.com>
2025-03-29 19:25:24 +01:00
Stefan Guilhen
89d659ee36
Add section about support for federated members in the organization documentation
...
Signed-off-by: Stefan Guilhen <sguilhen@redhat.com>
Closes #38471
2025-03-27 08:03:35 -03:00
Ricardo Martin
a7e63837db
Recovery codes documentation ( #38407 )
...
Closes #30702
Signed-off-by: rmartinc <rmartinc@redhat.com>
Co-authored-by: andymunro <48995441+andymunro@users.noreply.github.com>
2025-03-27 09:59:14 +01:00
Awambeng
27a7a301e7
Add documentation for configuring Keycloak as a VC issuer
...
closes #38256
Signed-off-by: Awambeng Rodrick <awambengrodrick@gmail.com>
2025-03-26 20:50:43 +01:00
Marek Posolda
db23d8e665
Clarify that XOAUTH2 configuration with Microsoft Office365 is community contributed
...
Closes #38376
Signed-off-by: mposolda <mposolda@gmail.com>
Signed-off-by: Marek Posolda <mposolda@gmail.com>
Co-authored-by: Alexander Schwartz <alexander.schwartz@gmx.net>
Co-authored-by: andymunro <48995441+andymunro@users.noreply.github.com>
2025-03-26 15:54:38 +01:00
Sebastian Rose
4fb1c41155
Sending Mails via SMTP and XOAUTH2 authentication mechanism
...
Closes #17432
Signed-off-by: Sebastian Rose <sebastian.rose@gmail.com>
2025-03-21 10:12:18 +01:00
Takashi Norimatsu
eb2153379a
DPoP: Refresh token created with DPoP can be refreshed without proof
...
closes #36475
Signed-off-by: Takashi Norimatsu <takashi.norimatsu.ws@hitachi.com>
2025-03-17 12:53:19 +01:00
andymunro
1f6f1571fd
update screens for new realm selector
...
Closes #37083
Signed-off-by: AndyMunro <amunro@redhat.com>
2025-03-15 10:54:00 +01:00
Marek Posolda
290905c9cf
Documentation for supported token-exchange ( #38008 )
...
closes #37126
Signed-off-by: Marek Posolda <mposolda@gmail.com>
Co-authored-by: Bruno Oliveira da Silva <bruno@abstractj.com>
Co-authored-by: andymunro <48995441+andymunro@users.noreply.github.com>
2025-03-14 09:55:44 +01:00
Mihir Vadalia
11a20a2eb3
Documentation for Optional Email Events
...
Closes #37998
Signed-off-by: Mihir Vadalia <mihir@defensepoint.com>
Co-authored-by: Mihir Vadalia <mihir@defensepoint.com>
2025-03-11 21:21:45 +01:00
Stefan Guilhen
86b2a6a95c
Fix docs to also mention roles
...
Signed-off-by: Stefan Guilhen <sguilhen@redhat.com>
Closes #28569
Signed-off-by: Jakob Overrein <jakob.overrein@basefarm-orange.com>
2025-03-10 16:13:36 -03:00
Stefan Guilhen
d44ebfd4d1
Document the addition of the Relative User Creation DN
...
Signed-off-by: Stefan Guilhen <sguilhen@redhat.com>
2025-03-10 16:13:36 -03:00
Giuseppe Graziano
690b5ecb25
Grant Type condition for client policies ( #37665 )
...
Closes #37124
Signed-off-by: Giuseppe Graziano <g.graziano94@gmail.com>
2025-02-27 11:51:06 +01:00
Jon Koops
3ccc88628f
Fix broken external link in Gitlab IdP docs ( #37435 )
...
Closes #37434
Signed-off-by: Jon Koops <jonkoops@gmail.com>
2025-02-18 11:03:53 +00:00
rmartinc
6850f41060
Force login in reset-credentials to federated users
...
Closes #37207
Signed-off-by: rmartinc <rmartinc@redhat.com>
2025-02-12 13:47:39 -03:00
Pedro Igor
bf3dcda87b
Updating messages
...
Signed-off-by: Pedro Igor <pigor.craveiro@gmail.com>
2025-02-07 10:42:45 -03:00
Alexander Schwartz
690b0e4bef
VERIFY_EMAIL as supported Application Initiated Action
...
Closes #25154
Signed-off-by: Alexander Schwartz <aschwart@redhat.com>
2025-02-06 16:49:28 +01:00
papastepano
0c46ad299c
Outdated documentation reCAPTCHA
...
Closes #36887
Signed-off-by: Stepan Papazyan <papastepano@gmail.com>
2025-01-29 21:03:45 +00:00
Ricardo Martin
8671f86046
Provide an option to force login after reset credentials ( #36856 )
...
Closes #36844
Signed-off-by: rmartinc <rmartinc@redhat.com>
Co-authored-by: Ricardo Martin <rmartinc@redhat.com>
Co-authored-by: andymunro <48995441+andymunro@users.noreply.github.com>
Co-authored-by: Marek Posolda <mposolda@gmail.com>
Signed-off-by: Marek Posolda <mposolda@gmail.com>
2025-01-28 18:35:02 +01:00
Giuseppe Graziano
bd807ceac3
Select auth flow via acr using client policies ( #36441 )
...
Closes #24297
Co-authored-by: Ben Cresitello-Dittmar <bcresitellodittmar@mitre.org>
Signed-off-by: Giuseppe Graziano <g.graziano94@gmail.com>
2025-01-23 19:46:07 +01:00
rmartinc
f89be1813d
Check next update time for CRL in certificate validation
...
Closes #35983
Signed-off-by: rmartinc <rmartinc@redhat.com>
2025-01-22 14:58:35 +01:00
rmartinc
17d2dd58ca
Add some common headers for the links check in docs
...
Closes #36675
Signed-off-by: rmartinc <rmartinc@redhat.com>
2025-01-22 12:21:29 +01:00
Pedro Igor
aca84824c0
Allow enforce that users are members of organizations when authenticating
...
Closes #34275
Signed-off-by: Pedro Igor <pigor.craveiro@gmail.com>
2025-01-17 19:48:55 +01:00
Stian Thorgersen
bc2665fc2a
Re-order items in release notes for 26.1 ( #36346 )
...
* Re-order items in release notes for 26.1
Signed-off-by: stianst <stianst@gmail.com>
* Review (#161 )
Signed-off-by: Alexander Schwartz <aschwart@redhat.com>
---------
Signed-off-by: stianst <stianst@gmail.com>
Signed-off-by: Alexander Schwartz <aschwart@redhat.com>
Co-authored-by: Alexander Schwartz <alexander.schwartz@gmx.net>
2025-01-14 09:21:04 +00:00
Marek Posolda
4ab34f4816
Updating release notes with core-clients contributions and features ( #36066 )
...
closes #35953
Signed-off-by: mposolda <mposolda@gmail.com>
Co-authored-by: andymunro <48995441+andymunro@users.noreply.github.com>
Signed-off-by: Marek Posolda <mposolda@gmail.com>
2024-12-20 10:15:55 +01:00
Marek Posolda
a3fd076960
Adding ConditionalClientScopeAuthenticator ( #36020 )
...
closes #36081
Signed-off-by: mposolda <mposolda@gmail.com>
Co-authored-by: andymunro <48995441+andymunro@users.noreply.github.com>
Signed-off-by: Marek Posolda <mposolda@gmail.com>
2024-12-20 09:53:51 +01:00
Jan Verhaeghe
56246096e0
Align on one realm-name placeholder
...
Closes #36047
Signed-off-by: Jan Verhaeghe <jan@hwfaq.be>
2024-12-19 13:48:18 +00:00
Thomas Darimont
3cdbbc5b15
Add support for Initiating User Registration via prompt=create ( #10701 ) ( #35903 )
...
Fixes #10701
Signed-off-by: Thomas Darimont <thomas.darimont@googlemail.com>
2024-12-16 19:54:52 +01:00
Ricardo Martin
bbca6116b0
Implement a conditional authenticator to check if a sub-flow was executed or not previously in the process ( #35668 )
...
Closes #35231
Signed-off-by: rmartinc <rmartinc@redhat.com>
Co-authored-by: Marek Posolda <mposolda@gmail.com>
Co-authored-by: andymunro <48995441+andymunro@users.noreply.github.com>
2024-12-12 11:16:30 +01:00
rmartinc
769bd6c9d0
Improve the note about group synchronization in sssd
...
Closes #35643
Signed-off-by: rmartinc <rmartinc@redhat.com>
2024-12-11 07:40:04 -03:00
Niko Köbler
2639f3ee43
set default ldap connection pooling to plain and ssl ( #35763 )
...
* set default ldap connection pooling to plain and ssl
closes #35758
2024-12-10 12:05:14 -03:00
Stian Thorgersen
5bc4ab1429
Delete OpenShift 3.x identity provider ( #34331 )
...
Closes #34330
Signed-off-by: stianst <stianst@gmail.com>
2024-12-06 11:24:47 +01:00
Alexander Schwartz
b98cd12b58
Changing mis-formatted definition list of hashing algorithms to a table
...
Closes #35416
Signed-off-by: Alexander Schwartz <aschwart@redhat.com>
2024-12-02 15:05:05 -03:00
Pedro Igor
e9e19c2683
Allow asking for additional scopes when querying the account console root URL
...
Closes #35243
Signed-off-by: Pedro Igor <pigor.craveiro@gmail.com>
Signed-off-by: Alexander Schwartz <aschwart@redhat.com>
Co-authored-by: Alexander Schwartz <aschwart@redhat.com>
2024-12-02 12:54:00 +00:00
Pedro Igor
45f9bcd673
Resolve scopes from bearer tokens when processing requests to the Account API
...
Closes #35357
Signed-off-by: Pedro Igor <pigor.craveiro@gmail.com>
2024-11-27 14:17:53 -03:00
Cornelius Roemer
29abfd3e89
Fix typos in *.md and *.adoc files using codespell interactive mode
...
Closes #35256
This PR fixes a bunch of typos in docs files.
I ran codespell on `*.adoc` and `*.md` files in the repo in interactive mode
carefully checking each identified typo and proposed fix for false positives.
The most widely read file with typos identified is likely the changelog/migration guide.
Signed-off-by: Cornelius Roemer <cornelius.roemer@gmail.com>
2024-11-25 08:21:26 +01:00
Cornelius Roemer
610c08a0f3
Fix typo www.recatcha.net -> www.recaptcha.net in docs ( #35210 )
...
closes #35210
Signed-off-by: Cornelius Roemer <cornelius.roemer@gmail.com>
2024-11-22 10:39:52 +01:00
AndyMunro
e2d221c4bd
Address QE comments on Server Admin Guide
...
Closes #34916
Signed-off-by: AndyMunro <amunro@redhat.com>
2024-11-22 10:20:18 +01:00
Václav Muzikář
d60cb9aaef
fix: prevent inclusion of characters that could lead to FileVault path traversal ( #35223 )
...
Closes : #35215
Signed-off-by: Peter Zaoral <pzaoral@redhat.com>
Co-authored-by: Peter Zaoral <pepo48@gmail.com>
2024-11-22 10:18:00 +01:00
Ricardo Martin
ca1c10f7ba
Use short UUID for ldap components ( #34815 )
...
Closes #32143
Signed-off-by: rmartinc <rmartinc@redhat.com>
2024-11-15 15:15:04 +01:00
Gilvan Filho
910caf5ff8
Update brute force docs
...
Fixes #27378
Signed-off-by: Gilvan Filho <gilvan.sfilho@gmail.com>
Signed-off-by: Alexander Schwartz <alexander.schwartz@gmx.net>
Co-authored-by: Alexander Schwartz <alexander.schwartz@gmx.net>
Co-authored-by: andymunro <48995441+andymunro@users.noreply.github.com>
2024-11-04 09:41:26 +00:00
AndyMunro
4984900bae
Make organizations chapter available in downstream
...
Closes #34382
Signed-off-by: AndyMunro <amunro@redhat.com>
2024-10-28 10:28:24 +01:00
Gilvan Filho
e6cd1a05c1
Update docs/documentation/server_admin/topics/threat/brute-force.adoc
...
Co-authored-by: andymunro <48995441+andymunro@users.noreply.github.com>
Signed-off-by: Gilvan Filho <gilvan.sfilho@gmail.com>
2024-10-22 10:33:22 -03:00
Gilvan Filho
c4005d29f0
add linear strategy to brute force
...
closes #25917
Signed-off-by: Gilvan Filho <gilvan.sfilho@gmail.com>
2024-10-22 10:33:22 -03:00
Simon Levermann
dcf1d83199
Enable enforcement of a minimum ACR at the client level ( #16884 ) ( #33205 )
...
closes #16884
Signed-off-by: Simon Levermann <github@simon.slevermann.de>
2024-10-21 13:54:02 +02:00
mposolda
dbcb3151a9
Align admin console for client for backchannel and frontchannel logout
...
closes #10138
Signed-off-by: mposolda <mposolda@gmail.com>
Co-authored-by: Erik Jan de Wit <edewit@redhat.com>
Signed-off-by: Marek Posolda <mposolda@gmail.com>
2024-10-21 11:32:03 +02:00
Jake
946798aa01
Small grammatical error in documentation
...
Closes #34009
Signed-off-by: Jake <156826184+jlanning-gl@users.noreply.github.com>
2024-10-16 18:49:49 +02:00
Stefan Guilhen
a832381a37
Add section to clarify the impact of having imported LDAP users when performing searches
...
Closes #16451
Signed-off-by: Stefan Guilhen <sguilhen@redhat.com>
2024-10-11 11:01:14 -03:00
vramik
b7eaa9b0cb
Wildcard search not working for custom user attributes
...
Closes #32451
Signed-off-by: vramik <vramik@redhat.com>
2024-10-03 08:48:36 -03:00
Maksim Zvankovich
35eba8be8c
Add option to include the organization id in the organization claims
...
Closes #32746
Signed-off-by: Maksim Zvankovich <m.zvankovich@nexovagroup.eu>
Co-authored-by: Stefan Guilhen <sguilhen@redhat.com>
2024-10-03 08:11:36 -03:00
vramik
c1653448f3
[Organizations] Allow orgs to define the redirect URL after user registers or accepts invitation link
...
Closes #33201
Signed-off-by: vramik <vramik@redhat.com>
2024-10-02 07:37:48 -03:00
Jon Koops
21704a70c1
Update documentation and release notes for Keycloak JS ( #33409 )
...
Closes #32843
Signed-off-by: Jon Koops <jonkoops@gmail.com>
2024-10-01 10:29:23 +02:00
vramik
412f1f85a9
Update Organization documentation
...
Closes #33410
Signed-off-by: vramik <vramik@redhat.com>
2024-10-01 09:29:49 +02:00
Stefan Guilhen
b717810061
Update organizations documentation in the server admin guide
...
Closes #33199
Signed-off-by: Stefan Guilhen <sguilhen@redhat.com>
Co-authored-by: andymunro <48995441+andymunro@users.noreply.github.com>
2024-09-27 16:27:54 +02:00
Stefan Guilhen
d87f67b4e6
Fix duplicated screenshots in the Fine grain admin permissions section of the Server Admin Guide
...
Closes #31083
Signed-off-by: Stefan Guilhen <sguilhen@redhat.com>
Co-authored-by: andymunro <48995441+andymunro@users.noreply.github.com>
2024-09-27 09:04:01 +02:00
Jon Koops
021a2af2fd
Compute SHA-256 digest for PKCE using the Web Crypto API ( #33251 )
...
Closes #33250
Signed-off-by: Jon Koops <jonkoops@gmail.com>
2024-09-25 16:19:16 +02:00
Jon Koops
188893222f
Remove references of statically served Keycloak JS from documentation
...
Closes #32821
Signed-off-by: Jon Koops <jonkoops@gmail.com>
2024-09-12 09:38:00 +02:00
Alexander Schwartz
b88ecc0237
Removing the extra two-minute Window for persistent user sessions ( #32660 )
...
Closes #28418
Signed-off-by: Alexander Schwartz <aschwart@redhat.com>
Signed-off-by: Michal Hajas <mhajas@redhat.com>
Co-authored-by: Michal Hajas <mhajas@redhat.com>
2024-09-09 09:28:48 +02:00
Theresa Henze
a1c23fef8c
introduce event types to update/remove credentials
...
Closes #10114
Signed-off-by: Theresa Henze <theresa.henze@bare.id>
2024-09-03 18:27:27 +02:00
Thomas Darimont
88a5c96fff
Add kc_action to redirect URI after a required action is cancelled ( #31925 )
...
Closes #31894
Signed-off-by: Thomas Darimont <thomas.darimont@googlemail.com>
2024-09-03 14:26:23 +00:00
Michal Hajas
af53af1506
Document persistent sessions are enabled by default
...
Closes #32387
Signed-off-by: Michal Hajas <mhajas@redhat.com>
Signed-off-by: Alexander Schwartz <aschwart@redhat.com>
Co-authored-by: Pedro Ruivo <pruivo@users.noreply.github.com>
Co-authored-by: Alexander Schwartz <aschwart@redhat.com>
2024-08-30 09:20:58 +00:00
Yuvi Panda
5210b7e546
Use Google as example, not Google+
...
Google+ no longer exists
Signed-off-by: Yuvi Panda <yuvipanda@gmail.com>
2024-08-26 10:18:52 +02:00
Pedro Igor
c1f6d5ca64
Support for selecting an organization when requesting the organization scope
...
Closes #31438
Signed-off-by: Pedro Igor <pigor.craveiro@gmail.com>
2024-08-21 13:04:58 +02:00
Yoshiyuki Tabata
cb6eb187ac
Client Policy - Condition : Client - Client Attribute
...
Closes https://github.com/keycloak/keycloak/issues/31766
Signed-off-by: Yoshiyuki Tabata <yoshiyuki.tabata.jy@hitachi.com>
2024-08-14 09:56:56 +02:00
Alexander Schwartz
d4991ce56f
Fix server guide cross-references for downstream docs
...
Closes #31947
Signed-off-by: Alexander Schwartz <aschwart@redhat.com>
2024-08-13 14:51:01 -03:00
Tero Saarni
62fd969fe1
Allow requests from local IPv6 addresses
...
If administrator selects EXTERNAL for Require SSL setting, allow clear-text
HTTP requests when client is coming from IPv6 link-local or unique local
address (ULA).
Previously only private IPv4 addresses were allowed and private IPv6 addresses
were rejected.
Closes #30678
Signed-off-by: Tero Saarni <tero.saarni@est.tech>
2024-08-05 16:38:55 +02:00
rmartinc
942d5d0aa3
Convert chapter planning for securing applications and services to guides
...
Final removal of the securing_apps documentation
Final checks for links, order and other minor things
Closes #31328
Signed-off-by: rmartinc <rmartinc@redhat.com>
2024-08-01 16:45:56 +02:00
rmartinc
b07b120f2a
Convert chapter client registration CLI from securing apps into guides
...
Closes #31333
Signed-off-by: rmartinc <rmartinc@redhat.com>
2024-07-30 18:30:46 +02:00
Marek Posolda
5b52117351
Documentation for Delete Credential action and related changes ( #31719 )
...
closes #31718
Signed-off-by: mposolda <mposolda@gmail.com>
Signed-off-by: Marek Posolda <mposolda@gmail.com>
Co-authored-by: andymunro <48995441+andymunro@users.noreply.github.com>
2024-07-30 10:05:14 +02:00
Giuseppe Graziano
c3019fb2d3
Move oidc documentation to guides ( #31627 )
...
Closes #31329
Signed-off-by: Giuseppe Graziano <g.graziano94@gmail.com>
2024-07-30 09:46:14 +02:00
Pedro Igor
f4b1a5ca88
Updating docs
...
Signed-off-by: Pedro Igor <pigor.craveiro@gmail.com>
2024-07-24 15:12:16 -03:00
Maciej Mierzwa
97e89e2071
feature: password age in days policy
...
Closes #30210
Signed-off-by: Maciej Mierzwa <dev.maciej.mierzwa@gmail.com>
2024-07-24 15:12:16 -03:00
rmartinc
9f2eddead8
Re-add notes about not supporting DPoP and holder-of-key in the remaining adapters
...
Closes #30874
Signed-off-by: rmartinc <rmartinc@redhat.com>
2024-07-24 11:55:47 +02:00
rmartinc
764ef4831a
Release notes and some notes for JavaKeystoreProvider changes
...
Closes #31226
Signed-off-by: rmartinc <rmartinc@redhat.com>
2024-07-17 10:44:45 +02:00
Thomas Darimont
e79d10e71e
Add missing user event translations to admin-ui
...
Fixes #27677
Signed-off-by: Thomas Darimont <thomas.darimont@googlemail.com>
Signed-off-by: Alexander Schwartz <aschwart@redhat.com>
Co-authored-by: Alexander Schwartz <aschwart@redhat.com>
2024-07-12 10:04:57 +02:00
Steven Hawkins
4970a9b729
fix: deprecate KEYCLOAK_ADMIN and KEYCLOAK_ADMIN_PASSWORD
...
closes : #30658
Signed-off-by: Steve Hawkins <shawkins@redhat.com>
Signed-off-by: Steven Hawkins <shawkins@redhat.com>
Co-authored-by: Jon Koops <jonkoops@gmail.com>
2024-07-11 18:07:57 +02:00
rmartinc
e80c3fee9b
Change link to https://github.com/eclipse/microprofile/wiki/JWT_Auth
...
Closes #31219
Signed-off-by: rmartinc <rmartinc@redhat.com>
2024-07-11 18:03:57 +02:00
rmartinc
096e335a92
Support for vault and AES and HMAC algorithms to JavaKeystoreKeyProvider
...
Closes #30880
Closes #29755
Signed-off-by: rmartinc <rmartinc@redhat.com>
2024-07-11 12:40:45 +02:00
Lucy Linder
0f7c2364f0
Update links in ReCAPTCHA doc
...
Google links changed and are now causing redirect issues reports.
Closes : #31187
Signed-off-by: Lucy Linder <lucy.derlin@gmail.com>
2024-07-11 00:27:09 +02:00
Martin Kanis
922eaa9fc8
Disable username prohibited chars validator when email as username is… ( #31140 )
...
* Disable username prohibited chars validator when email as the username is set
Closes #25339
Signed-off-by: Martin Kanis <mkanis@redhat.com>
Signed-off-by: Pedro Igor <pigor.craveiro@gmail.com>
Co-authored-by: Pedro Igor <pigor.craveiro@gmail.com>
2024-07-10 09:46:24 -03:00
Pedro Igor
b745ac8259
Documenting LDAP connection pooling
...
Closes #30995
Signed-off-by: Pedro Igor <pigor.craveiro@gmail.com>
2024-07-04 13:21:47 +02:00
Christoph Schulz
657aff787f
Add missing comma to ( #30914 )
...
Signed-off-by: Christoph Schulz <mail@ciis0.de>
Co-authored-by: Alexander Schwartz <alexander.schwartz@gmx.net>
2024-06-28 13:13:13 +00:00
Stan Silvert
a1445cd93f
Minor doc fix. ( #30899 )
...
Signed-off-by: Stan Silvert <ssilvert@redhat.com>
2024-06-27 16:18:32 -04:00
Douglas Palmer
54f4ab50f0
Broken external links
...
Closes #30717
Signed-off-by: Douglas Palmer <dpalmer@redhat.com>
2024-06-25 09:55:50 +02:00
Pedro Igor
a0ad680346
Adding an alias to organization and exposing them to templates
...
Closes #30312
Closes #30313
Signed-off-by: Pedro Igor <pigor.craveiro@gmail.com>
2024-06-20 14:36:14 -03:00
CARBONNEAUX Mathieu
acf79b81c7
add RS256 algorithm to webauthn default policy ( #30528 )
...
closes #28020
Signed-off-by: Mathieu CARBONNEAUX <mathieu.carbonneaux@ch2o.info>
2024-06-19 10:16:46 +02:00
Thibault Morin
f6fa869b12
feat(SAML): add Artifact Binding on brokering scenarios when Keycloak is SP ( #29619 )
...
* feat: add Artifact Binding on brokering scenarios when Keycloak is SP
Signed-off-by: tmorin <git@morin.io>
* Adding broker test and minor improvements
Signed-off-by: Pedro Igor <pigor.craveiro@gmail.com>
* Fixing IdentityProviderTest
Signed-off-by: Pedro Igor <pigor.craveiro@gmail.com>
* Renaming methods related to idp initiated flows
Signed-off-by: Pedro Igor <pigor.craveiro@gmail.com>
* Fixing partial_import_test.spec.ts
Signed-off-by: Pedro Igor <pigor.craveiro@gmail.com>
---------
Signed-off-by: tmorin <git@morin.io>
Signed-off-by: Pedro Igor <pigor.craveiro@gmail.com>
Co-authored-by: Pedro Igor <pigor.craveiro@gmail.com>
2024-06-14 08:54:49 -03:00
daviddelannoy
d4fc5249c4
fix label error for persistent-user-sessions feature flag in documentation
...
Closes #30368
Signed-off-by: daviddelannoy <16318239+daviddelannoy@users.noreply.github.com>
2024-06-12 09:32:10 +00:00
Pedro Igor
22da43c619
Fixing broken link ( #30299 )
...
Signed-off-by: Pedro Igor <pigor.craveiro@gmail.com>
2024-06-10 15:22:48 +02:00
Pedro Igor
c35bf11b1b
Adding organization section ( #29796 )
...
Closes #28731
Signed-off-by: Pedro Igor <pigor.craveiro@gmail.com>
Co-authored-by: andymunro <48995441+andymunro@users.noreply.github.com>
2024-06-10 09:08:50 +02:00
Steven Hawkins
c7e9ee2bff
fix: adds handling for all kcadm prompts as env variables ( #29430 )
...
closes : #21961
Signed-off-by: Steve Hawkins <shawkins@redhat.com>
2024-06-06 13:08:23 +00:00
Marek Posolda
79c8c80058
Example for X.509 direct grant flow authentication ( #30203 )
...
closes #29639
Signed-off-by: mposolda <mposolda@gmail.com>
Co-authored-by: andymunro <48995441+andymunro@users.noreply.github.com>
2024-06-06 11:58:09 +02:00
Marek Posolda
193439788e
Release notes for support application/jwt response in token introspec… ( #30105 )
...
closes #30104
Signed-off-by: mposolda <mposolda@gmail.com>
Co-authored-by: andymunro <48995441+andymunro@users.noreply.github.com>
2024-06-04 06:49:13 +02:00
Martin Bartoš
262fc09edc
OpenJDK 21 support ( #28518 )
...
* OpenJDK 21 support
Closes #28517
Co-authored-by: Václav Muzikář <vaclav@muzikari.cz>
Signed-off-by: Martin Bartoš <mabartos@redhat.com>
* x509 SAN UPN other name is not handled in JDK 21 (#904 )
closes #29968
Signed-off-by: mposolda <mposolda@gmail.com>
---------
Signed-off-by: Martin Bartoš <mabartos@redhat.com>
Signed-off-by: mposolda <mposolda@gmail.com>
Co-authored-by: Václav Muzikář <vaclav@muzikari.cz>
Co-authored-by: Marek Posolda <mposolda@gmail.com>
2024-06-03 14:17:28 +02:00
Marek Posolda
336b2c875f
Update release notes for Keycloak 25 ( #29894 )
...
closes #29576
Signed-off-by: mposolda <mposolda@gmail.com>
Co-authored-by: andymunro <48995441+andymunro@users.noreply.github.com>
2024-05-29 14:19:17 +02:00
Pedro Igor
bbb83236f5
Do not lower-case the username from the IdP when creating the federated identity
...
Closes #28495
Signed-off-by: Pedro Igor <pigor.craveiro@gmail.com>
2024-05-29 01:58:20 -03:00
Marek Posolda
6dc28bc7b5
Clarify the documentation about step-up authentication ( #29735 )
...
closes #28341
Signed-off-by: mposolda <mposolda@gmail.com>
Co-authored-by: andymunro <48995441+andymunro@users.noreply.github.com>
2024-05-21 19:46:27 +02:00
mposolda
bbd4b60163
Update documentation after adapters removal
...
closes #28792
Signed-off-by: mposolda <mposolda@gmail.com>
2024-05-21 09:34:48 +02:00
Takashi Norimatsu
b4e7d9b1aa
Passkeys: Supporting WebAuthn Conditional UI ( #24305 )
...
closes #24264
Signed-off-by: Takashi Norimatsu <takashi.norimatsu.ws@hitachi.com>
Signed-off-by: mposolda <mposolda@gmail.com>
Co-authored-by: mposolda <mposolda@gmail.com>
2024-05-16 07:58:43 +02:00
Alexander Schwartz
8deca303e2
Update instruction on how to enable persistent sessions ( #29490 )
...
Closes #29489
Signed-off-by: Alexander Schwartz <aschwart@redhat.com>
2024-05-15 13:26:51 +02:00
christian2
e200ccfa53
Fix URL endpoint for Docker registry v2 authentication
...
Closes #29132
Signed-off-by: Christian Hörtnagl <christian2@univie.ac.at>
2024-05-13 13:51:06 +02:00
Alexander Schwartz
6fbe207d64
Create documentation for persistent user sessions
...
Closes #29218
Signed-off-by: Alexander Schwartz <aschwart@redhat.com>
Signed-off-by: Michal Hajas <mhajas@redhat.com>
Co-authored-by: Michal Hajas <mhajas@redhat.com>
2024-05-13 11:02:45 +02:00
AndyMunro
4a5055c3cc
Update create realm topics to replace Master
...
Closes #29280
Signed-off-by: AndyMunro <amunro@redhat.com>
2024-05-08 17:37:20 +02:00
Nathan Raj
8ff1ae0c08
Update stack-overflow.adoc ( #29363 )
...
Corrected capitalisation for heading
2024-05-08 16:06:33 +02:00
Thore
4b194d00be
iso-date validator for the user-profile
...
Adds a new validator in order to be able to validate user-model fields which should be modified/supplied by a datepicker.
Closes #11757
Signed-off-by: Thore <thore@kruess.xyz>
2024-05-07 11:42:39 -03:00
Dimitri Papadopoulos Orfanos
9db1443367
Fix typos found by codespell in docs ( #28890 )
...
Run `chmod -x` on files that need not be executable.
Signed-off-by: Dimitri Papadopoulos <3234522+DimitriPapadopoulos@users.noreply.github.com>
Signed-off-by: Alexander Schwartz <aschwart@redhat.com>
Co-authored-by: Alexander Schwartz <aschwart@redhat.com>
2024-05-03 12:41:16 +00:00
Steven Hawkins
3b1ca46be2
fix: updating docs around -q parameter ( #29151 )
...
closes : #27877
Signed-off-by: Steve Hawkins <shawkins@redhat.com>
2024-05-02 16:48:43 +02:00
Douglas Palmer
8d4d5c1c54
Remove redundant servers from the testsuite
...
Closes #29089
Signed-off-by: Douglas Palmer <dpalmer@redhat.com>
2024-04-30 17:39:32 +02:00
Lex Cao
7e034dbbe0
Add IdpConfirmOverrideLinkAuthenticator to handle duplicate federated identity ( #26393 )
...
Closes #26201 .
Signed-off-by: Lex Cao <lexcao@foxmail.com>
Co-authored-by: andymunro <48995441+andymunro@users.noreply.github.com>
2024-04-22 11:30:14 +02:00
Ricardo Martin
fc6b6f0d94
Perform exact string match if redirect URI contains userinfo, encoded slashes or parent access ( #131 ) ( #28872 )
...
Closes keycloak/keycloak-private#113
Closes keycloak/keycloak-private#134
Signed-off-by: rmartinc <rmartinc@redhat.com>
Co-authored-by: Stian Thorgersen <stianst@gmail.com>
2024-04-18 16:02:24 +02:00
Alexander Schwartz
5b4a69a6e9
Limit the concurrency of password hashing to the number of CPU cores available
...
Closes #28477
Signed-off-by: Alexander Schwartz <aschwart@redhat.com>
2024-04-15 15:05:09 +02:00
Christopher Miles
1646315939
Deny list lower cases all passwords when loading from file
...
Closes #28381
We always lower case the inbound password before comparing against the deny list
yet the deny list may contain passwords that contain upper case letters. With
this change we will now convert passwords from the deny list into lower case
while loading, ensuring that more passwords match the deny list.
Signed-off-by: Christopher Miles <twitch@nervestaple.com>
2024-04-15 08:49:37 +02:00
Marek Posolda
e6747bfd23
Adjust priority of SubMapper ( #28663 )
...
closes #28661
Co-authored-by: andymunro <48995441+andymunro@users.noreply.github.com>
2024-04-12 14:13:03 +02:00
rmartinc
6d74e6b289
Escape slashes in full group path representation but disabled by default
...
Closes #23900
Signed-off-by: rmartinc <rmartinc@redhat.com>
2024-04-12 10:53:39 +02:00
Marek Posolda
13daaa55ba
Documentation for changes related to 'You are already logged in' scen… ( #28595 )
...
closes #27879
Signed-off-by: mposolda <mposolda@gmail.com>
Co-authored-by: andymunro <48995441+andymunro@users.noreply.github.com>
2024-04-11 08:18:41 +02:00
Giuseppe Graziano
c76cbc94d8
Add sub via protocol mapper to access token
...
Closes #21185
Signed-off-by: Giuseppe Graziano <g.graziano94@gmail.com>
2024-04-10 10:40:42 +02:00
Giuseppe Graziano
b4f791b632
Remove session_state from tokens
...
Closes #27624
Signed-off-by: Giuseppe Graziano <g.graziano94@gmail.com>
2024-04-08 08:12:51 +02:00
Giuseppe Graziano
fe06df67c2
New default client scope for 'basic' claims with 'auth_time' protocol mapper
...
Closes #27623
Signed-off-by: Giuseppe Graziano <g.graziano94@gmail.com>
2024-04-02 08:44:28 +02:00
Stian Thorgersen
c3a98ae387
Use Argon2 as default password hashing algorithm ( #28162 )
...
Closes #28161
Signed-off-by: stianst <stianst@gmail.com>
2024-03-22 13:04:14 +00:00