rmartinc
dd17f7d811
Add a test for IdpUsernamePasswordForm in webauthn CI job
...
Closes #41259
Signed-off-by: rmartinc <rmartinc@redhat.com >
2025-07-24 10:39:29 -03:00
mposolda
0b98cb7466
Passkeys support in IdpUsernamePasswordForm
...
closes #41259
Signed-off-by: mposolda <mposolda@gmail.com >
2025-07-24 10:39:29 -03:00
Giuseppe Graziano
8fc5664115
Add id token claims to OpenID Provider Metadata claims_supported
...
Closes #41170
Signed-off-by: Giuseppe Graziano <g.graziano94@gmail.com >
2025-07-24 07:21:45 -03:00
mposolda
57972d85d3
Update per feedback review
...
Signed-off-by: mposolda <mposolda@gmail.com >
2025-07-22 10:00:37 -03:00
mposolda
bba869b3d5
Fixing Re-authentication with passkeys
...
closes #41242
closes #41008
Signed-off-by: mposolda <mposolda@gmail.com >
2025-07-22 10:00:37 -03:00
rmartinc
e0bba39da0
Allow configure encryption details for SAML clients
...
Closes #40933
Signed-off-by: rmartinc <rmartinc@redhat.com >
2025-07-18 20:13:40 +02:00
Takashi Norimatsu
631aebd848
FAPI 2.0 Final - only accept its issuer identifier value as a string in the aud claim received in client authentication assertions
...
closes #41119
Signed-off-by: Takashi Norimatsu <takashi.norimatsu.ws@hitachi.com >
2025-07-18 08:26:21 +02:00
Ryan Emerson
4bb02305c3
Implement CompatibilityMetadataProvider for Cache CLI args
...
Closes #41138
Signed-off-by: Ryan Emerson <remerson@redhat.com >
2025-07-16 19:52:51 +02:00
Björn Eickvonder
d62d5030fe
Adds log context information for MDC for realm, users, etc.
...
Closes #39812
Signed-off-by: Björn Eickvonder <b.eicki@gmx.net >
Signed-off-by: Alexander Schwartz <aschwart@redhat.com >
Signed-off-by: Bjoern Eickvonder <bjoern.eickvonder@inform-software.com >
Co-authored-by: Pedro Ruivo <pruivo@users.noreply.github.com >
Co-authored-by: Alexander Schwartz <aschwart@redhat.com >
2025-07-16 17:46:46 +02:00
Pedro Igor
87f30a6285
Adding a config to the UPDATE_EMAIL action to force users to verify email
...
Closes #32569
Signed-off-by: Pedro Igor <pigor.craveiro@gmail.com >
2025-07-16 16:21:08 +02:00
Ryan Emerson
0a745d6aeb
Allow Features to declare that they support Rolling upgrades
...
Closes #41022
Signed-off-by: Ryan Emerson <remerson@redhat.com >
Signed-off-by: Alexander Schwartz <aschwart@redhat.com >
Co-authored-by: Alexander Schwartz <aschwart@redhat.com >
2025-07-16 12:10:29 +02:00
Takashi Norimatsu
f00cd980c4
Add FAPI 2.0 + DPoP security profile as default profile of client policies
...
closes #35441
Signed-off-by: Takashi Norimatsu <takashi.norimatsu.ws@hitachi.com >
2025-07-16 09:30:11 +02:00
Pedro Igor
d5206b61f6
Update email feature only enabled if the required action is enabled at the realm
...
Closes #41045
Signed-off-by: Pedro Igor <pigor.craveiro@gmail.com >
2025-07-14 16:31:15 -03:00
forkimenjeckayang
a3441689e9
[OID4VCI] OpenID for Verifiable Credentials support in client settings ( #39385 )
...
Closes #32967
Signed-off-by: forkimenjeckayang <forkimenjeckayang@gmail.com >
Co-authored-by: Francis Pouatcha <francis.pouatcha@adorsys.com >
2025-07-14 11:47:10 +02:00
Giuseppe Graziano
2f36276ff0
Remove FGAP:v1 from external-internal token exchange ( #40938 )
...
Closes #40855
Signed-off-by: Giuseppe Graziano <g.graziano94@gmail.com >
2025-07-11 17:42:47 +02:00
mposolda
274afa88fa
Add option 'Requires short state parameter' to OIDC IDP
...
closes #40237
Signed-off-by: mposolda <mposolda@gmail.com >
2025-07-11 16:17:03 +02:00
Pedro Igor
919554e6fc
Resolve organization when scope is requested and the user is a member or the email domain matches the organization
...
Closes #39864
Signed-off-by: Pedro Igor <pigor.craveiro@gmail.com >
2025-07-10 20:38:47 +02:00
Pedro Igor
88069cd5fb
Mark user session for removal when the user bound to cannot be resolved
...
Closes #40398
Signed-off-by: Pedro Igor <pigor.craveiro@gmail.com >
2025-07-10 20:37:18 +02:00
Pascal Knüppel
f39a37d8d1
[OID4VCI] Move realm attributes to clientScope and protocol-mappers ( #39768 )
...
fixes #39527
Signed-off-by: Pascal Knüppel <pascal.knueppel@governikus.de >
Signed-off-by: Captain-P-Goldfish <captain.p.goldfish@gmx.de >
2025-07-10 14:46:36 +02:00
Martin Kanis
5a42390341
Make UPDATE_EMAIL a supported feature
...
Closes #40227
Signed-off-by: Martin Kanis <mkanis@redhat.com >
2025-07-09 10:15:48 -03:00
michael.cordingley
20a4dc283b
Generate a UUID to be the JTI instead of reusing the nonce.
...
Signed-off-by: michael.cordingley <michael.cordingley@upstart.com >
2025-07-09 13:15:17 +02:00
forkimenjeckayang
beb4be6b32
[OID4VCI] : Update Credential Issuer Metadata Model for OID4VCI Draft-15 ( #40749 )
...
Closes #39290
Signed-off-by: forkimenjeckayang <forkimenjeckayang@gmail.com >
2025-07-09 11:41:17 +02:00
Håvar Nøvik
9d41092944
BUGFIX: session limit exceeded for both client & realm
...
This commit fixes a bug the wrong user session is removed if the user session limit
for realm and client is exceeded at the same time.
Closes #38016
Signed-off-by: Håvar Nøvik <havar@novik.email >
2025-07-09 11:37:55 +02:00
rmartinc
900d8c7400
Changing default passwordless webauthn policy to follow recommended values in the documentation
...
Closes #40792
Signed-off-by: rmartinc <rmartinc@redhat.com >
2025-07-09 11:34:28 +02:00
rmartinc
6b050776bc
Set client in the session context for logout token encode
...
Closes #40984
Signed-off-by: rmartinc <rmartinc@redhat.com >
2025-07-09 10:50:05 +02:00
rmartinc
d62114e50e
Do not add steps if feature disabled in default flows
...
Allow login if a step is disabled even the authenticator is not enabled by profile
Closes #40954
Signed-off-by: rmartinc <rmartinc@redhat.com >
2025-07-09 10:44:36 +02:00
vramik
332c9b6e4a
Fix NPE when accessing group concurrently
...
Closes #40368
Signed-off-by: vramik <vramik@redhat.com >
2025-07-08 16:13:54 -03:00
Ogen Bertrand
e92b825a14
[OID4VCI]: Add a unique notification_id generation to OID4VCIssuerEndpoint used in CredentialResponse. ( #40229 )
...
closes #39284
Signed-off-by: Ogenbertrand <ogenbertrand@gmail.com >
2025-07-08 19:57:31 +02:00
Steven Hawkins
193ab471c1
fix: correcting to use the X-Forwarded-Proto header ( #40905 )
...
close : #40903
Signed-off-by: Steve Hawkins <shawkins@redhat.com >
2025-07-07 17:07:47 +02:00
vramik
114afee7f1
Use MgmtPermissionsV2 by default
...
Closes #40192
Signed-off-by: vramik <vramik@redhat.com >
2025-07-07 11:07:21 -03:00
Steven Hawkins
eba4934950
fix: correcting spi-theme options
...
closes : #40930
Signed-off-by: Steve Hawkins <shawkins@redhat.com >
2025-07-07 13:18:24 +00:00
forkimenjeckayang
2aca97bd19
Remove interval property from Credential Offer ( #40412 )
...
Closes #39294
Signed-off-by: forkimenjeckayang <forkimenjeckayang@gmail.com >
2025-07-07 13:55:39 +02:00
forkimenjeckayang
178b893492
Always Return Array of Credentilas for Credential Responses ( #40409 )
...
Closes #39283
Signed-off-by: forkimenjeckayang <forkimenjeckayang@gmail.com >
Co-authored-by: Francis Pouatcha <francis.pouatcha@adorsys.com >
2025-07-07 13:53:28 +02:00
mkrueger92
b70342dda7
Fix NPE when client is not set in context during token encoding
...
This commit fixes an issue throwing an NPE when trying to encode a token without having a client set in the session context. In other places in this class (like getSignatureAlgorithm(String)) this is checked. But in the type(TokenCategory) it was forgotten to check.
2025-07-07 13:01:25 +02:00
mposolda
47ca339656
More secure call of Facebook debug token
...
closes #40926
Signed-off-by: mposolda <mposolda@gmail.com >
2025-07-04 14:44:56 +02:00
Barathwaja S
81a7f38a76
Added emailVerified filtering for users endpoint; updated user count endpoint with logic to support enabled, emailVerified, idpAlias, idpUserId, and exact field query parameters
...
Closes #38556
Closes #29295
Signed-off-by: Barathwaja S <sbarathwaj4@gmail.com >
2025-07-03 17:05:36 -03:00
mposolda
c52edc853d
Verification of external OIDC token by introspection-endpoint. Adding ExternalInternalTokenExchangeV2Test
...
closes #40167
closes #40198
Signed-off-by: mposolda <mposolda@gmail.com >
2025-07-03 16:23:13 +02:00
Giuseppe Graziano
886c592422
Verification of external GitHub token via "check token" endpoint
...
Closes #40164
Signed-off-by: Giuseppe Graziano <g.graziano94@gmail.com >
2025-07-01 15:03:49 +02:00
rmartinc
2db98b6a98
Use POST binding for logout when REDIRECT url is not set and forced POST
...
Closes #40637
Signed-off-by: rmartinc <rmartinc@redhat.com >
2025-06-30 10:30:12 +02:00
Niko Köbler
e7e4ce8339
make abstract class AbstractUserRoleMappingMapper public (was package-private)
...
closes #40765
Signed-off-by: Niko Köbler <niko@n-k.de >
2025-06-28 11:38:34 +02:00
Pedro Igor
304bcdce88
Do not show update email link if the email attribute is not writable
...
Closes #39669
Signed-off-by: Pedro Igor <pigor.craveiro@gmail.com >
2025-06-28 10:19:41 +02:00
Douglas Palmer
a981f6b6d5
Access Token IDs have less than 128 bits of entropy
...
Closes #38663
Signed-off-by: Douglas Palmer <dpalmer@redhat.com >
2025-06-26 16:48:03 +02:00
Giuseppe Graziano
150ac639bf
Verification of external facebook token via "debug token" endpoint
...
Closes #40163
Signed-off-by: Giuseppe Graziano <g.graziano94@gmail.com >
2025-06-26 15:21:20 +02:00
Pedro Igor
dcb136ff4e
Resolve resources with same URI if the permission request is based on URI matching
...
Closes #40695
Signed-off-by: Pedro Igor <pigor.craveiro@gmail.com >
2025-06-26 08:24:44 +02:00
rmartinc
a9202d48e2
Integrate passkeys with the organization authenticator
...
Closes #40022
Signed-off-by: rmartinc <rmartinc@redhat.com >
2025-06-26 08:15:36 +02:00
rmartinc
5af775db0f
Allow passkeys login when user has no password credential
...
Closes #40717
Signed-off-by: rmartinc <rmartinc@redhat.com >
2025-06-26 08:09:09 +02:00
Oliver
af40a4db19
Forward LOGIN_HINT of authentication session with identity-provider-redirector
...
Fixes keycloak#36396
Signed-off-by: Oliver Cremerius <antikalk@users.noreply.github.com >
2025-06-26 06:08:36 +02:00
rmartinc
cc7b63cfc6
Integrate passkeys with separate username and password forms
...
Closes #40021
Signed-off-by: rmartinc <rmartinc@redhat.com >
2025-06-25 09:43:48 +02:00
rmartinc
86f0a7864f
Disable email verification when email manually changed by idp review
...
Closes #40446
Signed-off-by: rmartinc <rmartinc@redhat.com >
2025-06-25 08:56:03 +02:00
Douglas Palmer
1183157d86
Key generation for client authentication is always RSA 2048 with a 10-year validity, regardless of the selected algorithm
...
Closes #38620
Signed-off-by: Douglas Palmer <dpalmer@redhat.com >
2025-06-25 08:15:43 +02:00