Alexander Schwartz
6a202146b4
Handle already existing user session in the store
...
Closes #40374
Signed-off-by: Alexander Schwartz <aschwart@redhat.com >
2025-09-11 14:58:53 +02:00
Stian Thorgersen
51465f52a3
Get client by client attribute
...
Closes #42543
Signed-off-by: stianst <stianst@gmail.com >
2025-09-11 12:07:13 +00:00
Stian Thorgersen
1e5d52975e
Refactor JWTValidator to allow use both for self-signed and federated client assertions ( #42472 )
...
Closes : #42463
Signed-off-by: stianst <stianst@gmail.com >
2025-09-10 08:11:18 +02:00
mposolda
5a05d2123e
Unbounded login_hint parameter Can Corrupt KC_RESTART Cookie
...
closes #40857
Signed-off-by: mposolda <mposolda@gmail.com >
2025-09-09 11:05:19 +02:00
Ogen Bertrand
d13c953fe4
[OID4VCI] Implement multiple credential issuance ( #42167 )
...
closes #39277
Signed-off-by: Ingrid Kamga <Ingrid.Kamga@adorsys.com >
Co-authored-by: Ingrid Kamga <Ingrid.Kamga@adorsys.com >
2025-09-09 09:49:03 +02:00
Pedro Igor
0074704e76
Fixing UI to allow linking brokers ot orgs without a domain
...
Closes #42408
Signed-off-by: Pedro Igor <pigor.craveiro@gmail.com >
2025-09-08 17:46:46 +00:00
Takashi Norimatsu
d740c0f3db
FAPI 2.0 Security Profile Final - Add FAPI 2.0 Final security profile as default profile of client policies
...
closes #41120
Signed-off-by: Takashi Norimatsu <takashi.norimatsu.ws@hitachi.com >
2025-09-08 17:23:53 +02:00
Ingrid Kamga
8fafd4c209
Understand key attestations as additional information to jwt proofs or as per new attestation proof type (for Key binding)
...
Signed-off-by: Ingrid Kamga <Ingrid.Kamga@adorsys.com >
2025-09-08 17:18:37 +02:00
Steven Hawkins
05c7c625d3
fix: don't show the local access screen if a service account exists ( #42218 )
...
closes : #42201
Signed-off-by: Steve Hawkins <shawkins@redhat.com >
2025-09-05 18:22:31 +02:00
Marek Posolda
6a27a4c336
EdDSA support for DPoP ( #42362 )
...
closes #42286
Signed-off-by: mposolda <mposolda@gmail.com >
2025-09-05 12:54:43 +02:00
Johannes Knutsen
973e9ad176
Add a global filter which throws bad request if a query parameter value has a control character
...
Closes #41117
Signed-off-by: Johannes Knutsen <johannes@kodet.no >
2025-09-04 10:19:51 -03:00
Awambeng
f9cb8dfe3d
[OID4VCI]: Add DPoP nonce header support to OID4VCI nonce endpoint ( #41999 )
...
Closes #41580
Signed-off-by: Awambeng Rodrick <awambengrodrick@gmail.com >
2025-09-04 14:52:10 +02:00
forkimenjeckayang
d5feb76f1f
Restructure credential_configurations_supported parsing to handle credential_metadata with display and claims && Update Credential Issuer Metadata structure ( #42001 )
...
Closes #41587
Closes #41597
Signed-off-by: forkimenjeckayang <forkimenjeckayang@gmail.com >
2025-09-04 14:48:56 +02:00
Awambeng
3cd2141698
Add invalid_nonce error support for OID4VCI ( #41977 )
...
Closes #39292
Signed-off-by: Awambeng Rodrick <awambengrodrick@gmail.com >
2025-09-04 13:15:29 +02:00
Takashi Norimatsu
ea63cdc97a
Compliant with RFC8414, return server metadata at /.well-known/oauth-authorization-server/realms/{realm}
...
closes #40923
Signed-off-by: Takashi Norimatsu <takashi.norimatsu.ws@hitachi.com >
2025-09-03 19:14:37 +02:00
forkimenjeckayang
a74076e8ab
Enforce batch_size ≥ 2 validation for batch_credential_issuance ( #42003 )
...
Closes #41590
Signed-off-by: forkimenjeckayang <forkimenjeckayang@gmail.com >
2025-09-03 17:15:55 +02:00
Awambeng Rodrick
dc6afee14e
Update OID4VCI error handling for draft 16 specification
...
- Replace unsupported_credential_type and unsupported_credential_format with unknown_credential_configuration
- Add new unknown_credential_identifier error type as per OID4VCI draft 16
- Update error handling logic to differentiate between credential configuration and identifier errors
- Add comprehensive test coverage for new error types
Closes #41591
Signed-off-by: Awambeng Rodrick <awambengrodrick@gmail.com >
Refactor error handling in OID4VCIssuerEndpoint
Signed-off-by: Awambeng Rodrick <awambengrodrick@gmail.com >
Resolve comments on PR
Signed-off-by: Awambeng Rodrick <awambengrodrick@gmail.com >
fix failing test
Signed-off-by: Awambeng Rodrick <awambengrodrick@gmail.com >
2025-09-03 16:53:22 +02:00
forkimenjeckayang
fc73537ba7
Rename ldp_vp to di_vp and restructure proofs object for Draft 16 compliance ( #41982 )
...
Closes #41576
Closes #41577
Closes #41581
Signed-off-by: forkimenjeckayang <forkimenjeckayang@gmail.com >
2025-09-03 16:33:43 +02:00
mposolda
624d236ced
DPoP verification support for admin/account REST API endpoints. Java admin-client DPoP support
...
closes #33942
Signed-off-by: mposolda <mposolda@gmail.com >
2025-09-02 14:29:30 +02:00
Giuseppe Graziano
6dc9d0d439
Check manage-account-links role for client initiated account linking
...
Closes #41914
Signed-off-by: Giuseppe Graziano <g.graziano94@gmail.com >
2025-09-01 11:25:49 +02:00
Alexis Rico
224ccbb79d
Make organization domains optional
...
Closes #31285
Signed-off-by: Alexis Rico <sferadev@gmail.com >
2025-08-27 18:11:15 -03:00
Niko Köbler
236d2f9f62
Add configuration option to automatically add recovery codes action after otp configuration
...
closes #41836
Signed-off-by: Niko Köbler <niko@n-k.de >
Signed-off-by: Alexander Schwartz <aschwart@redhat.com >
Co-authored-by: Alexander Schwartz <aschwart@redhat.com >
2025-08-27 17:56:59 +02:00
Alexander Schwartz
ca1e61047a
Adding TiDB dialect for Quarkus
...
Closes #41897
Signed-off-by: Alexander Schwartz <aschwart@redhat.com >
Signed-off-by: Dennis Kniep <kniepdennis@gmail.com >
Co-authored-by: Dennis Kniep <kniepdennis@gmail.com >
2025-08-26 17:44:45 -03:00
Ricardo Martin
360ff7050c
Use back keycloak-js instead of initiate login in the backend for account ( #42035 )
...
Closes #40463
Signed-off-by: rmartinc <rmartinc@redhat.com >
2025-08-26 16:29:46 +02:00
laureat-natzka
edbe28147e
Pass IDP config values to themes ( #40373 )
...
Signed-off-by: Laureat Grepi <laureat@Laureat-MacBook-Pro.local >
Co-authored-by: Laureat Grepi <laureat@Laureat-MacBook-Pro.local >
2025-08-25 17:50:06 +00:00
Ricardo Martin
46e990b7a7
Check for non-ascii local part on emails depending on SMTP configuration
...
Closes #41994
Signed-off-by: rmartinc <rmartinc@redhat.com >
2025-08-21 08:16:47 +00:00
Alexander Schwartz
09f863bf9d
Don't validate duplicate credential label on update if label is unchanged
...
Closes #41945
Signed-off-by: Alexander Schwartz <alexander.schwartz@gmx.net >
2025-08-20 08:06:06 +02:00
Pedro Igor
c7fedb77e3
Skip processing HEAD requests for action tokens
...
Closes #41834
Signed-off-by: Pedro Igor <pigor.craveiro@gmail.com >
2025-08-19 17:26:03 -03:00
rmartinc
0ff7d551dd
Check null for new keySize and validity parameters when generating certificates
...
Closes #41906
Signed-off-by: rmartinc <rmartinc@redhat.com >
2025-08-19 21:53:24 +02:00
Pedro Igor
b97aad0938
URL encode forwarded parameters
...
Closes #41755
Signed-off-by: Pedro Igor <pigor.craveiro@gmail.com >
2025-08-19 11:44:12 +02:00
Sebastian Łaskawiec
988bf9cb0b
WelcomeResource do not create temporary admins ( #41416 )
...
Signed-off-by: Sebastian Łaskawiec <sebastian.laskawiec@defenseunicorns.com >
2025-08-18 17:31:26 +02:00
Martin Kanis
aa5fadb863
Flaky test: org.keycloak.testsuite.federation.ldap.LDAPReadOnlyTest#testReadOnlyUserGetsPermanentlyLocked
...
Closes #41882
Signed-off-by: Martin Kanis <mkanis@redhat.com >
2025-08-15 15:51:25 -03:00
Moshie Samuel
6958f57f0a
add configurable cooldown for email resend in VerifyEmail
...
Closes #41331
Signed-off-by: Moshie Samuel <moshie.samuel@gmail.com >
Signed-off-by: moshiem <moshiem@hardcorebiometric.com >
Signed-off-by: Alexander Schwartz <aschwart@redhat.com >
Co-authored-by: moshiem <moshiem@hardcorebiometric.com >
Co-authored-by: Alexander Schwartz <aschwart@redhat.com >
2025-08-15 07:31:00 +02:00
Akbar Husain
06f80416fb
Replace keySet with entrySet
...
Closes #40064
Signed-off-by: akbarhusainpatel <apatel@intermiles.com >
Co-authored-by: akbarhusainpatel <apatel@intermiles.com >
2025-08-14 17:31:15 +02:00
Pedro Igor
3bf46e5421
"linked-accounts" endpoint displays all Identity providers
...
Closes #19732
Signed-off-by: Réda Housni Alaoui <reda-alaoui@hey.com >
Co-authored-by: Réda Housni Alaoui <reda-alaoui@hey.com >
2025-08-14 15:21:03 +02:00
Pedro Igor
3136ec25e6
memberOf attribute empty or values with a DN that does not match the role base DN fetches all roles
...
Closes #41842
Signed-off-by: Pedro Igor <pigor.craveiro@gmail.com >
2025-08-14 11:15:52 +02:00
Dennis Kniep
d74a10d87a
Add TiDB as supported db
...
Closes #41455
Signed-off-by: Dennis Kniep <kniepdennis@gmail.com >
Signed-off-by: Alexander Schwartz <aschwart@redhat.com >
Co-authored-by: Alexander Schwartz <aschwart@redhat.com >
2025-08-14 07:27:21 +00:00
Pedro Igor
9c631abb0d
Remove unnecessary jandex dependency declaration
...
Signed-off-by: Pedro Igor <pigor.craveiro@gmail.com >
2025-08-13 10:30:41 -03:00
Lukas Hanusovsky
5b3b36e300
Move RealmRolesTest.java to the new testsuite ( #41404 )
...
Part of: #34494
Signed-off-by: Lukas Hanusovsky <lhanusov@redhat.com >
2025-08-13 12:56:23 +02:00
Réda Housni Alaoui
a99149b83a
Login[v2]: "Update email" screen is not polished
...
Signed-off-by: Réda Housni Alaoui <reda-alaoui@hey.com >
2025-08-12 07:45:46 -03:00
rmartinc
acf39b34c3
Make passkeys feature supported
...
Closes #41556
Signed-off-by: rmartinc <rmartinc@redhat.com >
2025-08-12 11:18:57 +02:00
Takashi Norimatsu
52a47a63f4
RejectImplicitGrantExecutor does not return an error when a PAR request includes Implicit or Hybrid response type
...
closes #41609
Signed-off-by: Takashi Norimatsu <takashi.norimatsu.ws@hitachi.com >
2025-08-11 17:00:53 +02:00
Lukas Hanusovsky
f12ab6b189
Move RealmTest.java to the new testsuite ( #41326 )
...
Part of: #34494
Signed-off-by: Lukas Hanusovsky <lhanusov@redhat.com >
2025-08-11 16:24:27 +02:00
Martin Kanis
6a77072098
Skip update email required action if email attribute is not writable
...
Closes #41035
Signed-off-by: Martin Kanis <mkanis@redhat.com >
2025-08-11 08:51:16 -03:00
Pedro Igor
84fc9bb3e5
Allow forwarding parameters set as a client note in the authentication session
...
Closes #41670
Signed-off-by: Pedro Igor <pigor.craveiro@gmail.com >
2025-08-06 14:57:47 -03:00
Pedro Igor
ac632d609e
Do not allow setting default values for root attributes
...
Signed-off-by: Pedro Igor <pigor.craveiro@gmail.com >
2025-08-06 13:59:54 -03:00
huyenvu2101
5436f9781c
Allow setting default value for userprofile attribute
...
Closes #36160
Signed-off-by: huyenvu2101 <vhuyen2101@gmail.com >
2025-08-06 13:59:54 -03:00
Steven Hawkins
c231574d4c
fix: ensuring the ordering of the providers ( #41685 )
...
closes : #41653
Signed-off-by: Steve Hawkins <shawkins@redhat.com >
2025-08-06 10:06:56 +02:00
Pedro Igor
6014a0e1a2
Fixing test
...
Signed-off-by: Pedro Igor <pigor.craveiro@gmail.com >
2025-08-05 14:14:49 -03:00
Alexander Böhm
9cdbd1cc35
added a non-null check to check whether the to be exported realm exists ( #40655 )
...
* added non-null check for the exported realm like already used in SingleFileExportProvider to have a proper error message in case the realm does not exist
Closes #39122
Signed-off-by: Alexander Böhm <boehm.alexanderb@gmail.com >
* added tests based upon review conversation
Closes #39122
Signed-off-by: Alexander Böhm <boehm.alexanderb@gmail.com >
* updating tests for non existent realm name
Signed-off-by: Steve Hawkins <shawkins@redhat.com >
---------
Signed-off-by: Alexander Böhm <boehm.alexanderb@gmail.com >
Signed-off-by: Steve Hawkins <shawkins@redhat.com >
Co-authored-by: Steve Hawkins <shawkins@redhat.com >
2025-08-04 08:42:55 -04:00