Commit Graph

5309 Commits

Author SHA1 Message Date
Alexander Schwartz 7629b7dc53 Show required fields when configuring protocol mappers
Closes #40619

Signed-off-by: Alexander Schwartz <aschwart@redhat.com>
2025-08-15 07:28:45 +02:00
Akbar Husain 06f80416fb Replace keySet with entrySet
Closes #40064

Signed-off-by: akbarhusainpatel <apatel@intermiles.com>
Co-authored-by: akbarhusainpatel <apatel@intermiles.com>
2025-08-14 17:31:15 +02:00
Anchels 90d241087d Removed redundant null checks
Closes #40677

Signed-off-by: Anchels <mishtitov@gmail.com>
2025-08-14 17:03:27 +02:00
Pedro Igor 3bf46e5421 "linked-accounts" endpoint displays all Identity providers
Closes #19732

Signed-off-by: Réda Housni Alaoui <reda-alaoui@hey.com>
Co-authored-by: Réda Housni Alaoui <reda-alaoui@hey.com>
2025-08-14 15:21:03 +02:00
mposolda a8fa4ecb14 Remove OIDCLoginProtocolService.certsHead()
closes #41837

Signed-off-by: mposolda <mposolda@gmail.com>
2025-08-13 16:51:52 +02:00
Alexander Schwartz 96d2e041fc Add information about sessions to the MDC
Closes #41208

Signed-off-by: Alexander Schwartz <aschwart@redhat.com>
2025-08-13 09:06:29 -03:00
rmartinc da5f5281cd Do not remove the recaptcha form data because it is useless
Closes #41148

Signed-off-by: rmartinc <rmartinc@redhat.com>
2025-08-13 11:35:48 +02:00
Peter Skopek 651d651c30 Add missing artifact descriptions to allow Maven Central Portal Publisher pass validation process. (#40822)
Signed-off-by: Peter Skopek <pskopek@redhat.com>
2025-08-12 16:50:17 +02:00
rmartinc acf39b34c3 Make passkeys feature supported
Closes #41556

Signed-off-by: rmartinc <rmartinc@redhat.com>
2025-08-12 11:18:57 +02:00
vramik a8225655cf Initial commit for the RLM feature
Closes #40340
Closes #40341

Co-authored-by: Stefan Guilhen <sguilhen@redhat.com>
Co-authored-by: Pedro Igor <pigor.craveiro@gmail.com>

Signed-off-by: vramik <vramik@redhat.com>
2025-08-11 17:34:41 -03:00
Takashi Norimatsu 52a47a63f4 RejectImplicitGrantExecutor does not return an error when a PAR request includes Implicit or Hybrid response type
closes #41609

Signed-off-by: Takashi Norimatsu <takashi.norimatsu.ws@hitachi.com>
2025-08-11 17:00:53 +02:00
Martin Kanis 6a77072098 Skip update email required action if email attribute is not writable
Closes #41035

Signed-off-by: Martin Kanis <mkanis@redhat.com>
2025-08-11 08:51:16 -03:00
rmartinc a58556d761 Use Optional instead of getOrDefault for settings in testSMTPConnection
Closes #41643

Signed-off-by: rmartinc <rmartinc@redhat.com>
2025-08-07 11:26:30 +02:00
Pedro Igor 84fc9bb3e5 Allow forwarding parameters set as a client note in the authentication session
Closes #41670

Signed-off-by: Pedro Igor <pigor.craveiro@gmail.com>
2025-08-06 14:57:47 -03:00
Pedro Igor ac632d609e Do not allow setting default values for root attributes
Signed-off-by: Pedro Igor <pigor.craveiro@gmail.com>
2025-08-06 13:59:54 -03:00
huyenvu2101 5436f9781c Allow setting default value for userprofile attribute
Closes #36160

Signed-off-by: huyenvu2101 <vhuyen2101@gmail.com>
2025-08-06 13:59:54 -03:00
statist32 93bcb16b20 Use providerId from class attribute
Signed-off-by: statist32 <lars_31@hotmail.de>
2025-08-05 14:14:49 -03:00
statist32 85ad8a3b0d Load declarative component instead of any user profile component
Signed-off-by: statist32 <lars_31@hotmail.de>
2025-08-05 14:14:49 -03:00
Steven Hawkins 11924e6473 enhance: adding the ability to get the root config from a Scope
closes: #36268

Signed-off-by: Steve Hawkins <shawkins@redhat.com>
2025-08-05 18:51:33 +02:00
Adham Ahmed Hussein Mahrous 0c2226b4c4 Show transport media for WebAuthn authenticators in Account console
Closes #10063

Signed-off-by: Adham Ahmed Hussein Mahrous <adhamahmad541@gmail.com>
2025-08-05 15:03:59 +02:00
Ogen Bertrand db01ff742b [OID4VCI] Add support for credential_response_encryption in credential request (#41001)
Closes #39310
Closes #41031


Signed-off-by: Ogenbertrand <ogenbertrand@gmail.com>
2025-08-04 10:44:41 +00:00
mposolda 3cc8808465 Wrap deprecated passkeys authenticator behind the feature
closes #40696

Signed-off-by: mposolda <mposolda@gmail.com>
2025-08-01 16:48:57 +02:00
forkimenjeckayang 43610cfa67 [OID4VCI] Update SD-JWT VCs Format Identifier to dc+sd-jwt (#41233)
Closes #39293

Signed-off-by: forkimenjeckayang <forkimenjeckayang@gmail.com>
2025-08-01 09:13:35 +02:00
mposolda 2dab73063d Getting error 405 'Method Not Allowed' when calling the 'certs' endpoint with HEAD method
closes #41537

Signed-off-by: mposolda <mposolda@gmail.com>
2025-07-31 14:32:07 +02:00
Björn Eickvonder c7cc162f6b Support for RSA Key Size of 3072
Closes #41551

Signed-off-by: Bjoern Eickvonder <bjoern.eickvonder@inform-software.com>
2025-07-31 13:30:33 +02:00
Alexander Schwartz e1b3afb686 Refresh token for an OAuth2 based IDP when retrieving the IDP token
Closes #14644

Signed-off-by: Alexander Schwartz <aschwart@redhat.com>
2025-07-31 11:11:34 +02:00
Keshav Deshpande bee7e4b335 Change error to 400 for unknown user (#40939)
Closes #39079

Signed-off-by: Keshav Deshpande <keshavprashantdeshpande@gmail.com>
2025-07-31 10:23:14 +02:00
rmartinc 1f608fae6e Create a new condition for credential type and add it to default flows
Closes #41354

Signed-off-by: rmartinc <rmartinc@redhat.com>
2025-07-31 10:14:15 +02:00
Thomas Darimont 97dfbd2c84 Add details about client assertion to event
Fixes #41405

Signed-off-by: Thomas Darimont <thomas.darimont@googlemail.com>
2025-07-30 18:50:27 +00:00
Takashi Norimatsu 71f510d115 PAR endpoind does not return an appropriate error regarding a request objec
closes #41181

Signed-off-by: Takashi Norimatsu <takashi.norimatsu.ws@hitachi.com>
2025-07-29 14:34:39 +02:00
秉虎 d2e9b09ebc Migrate to zh-Hant / zh-Hans for Chinese language
Closes: #41239

Signed-off-by: 秉虎 <s96016641@gmail.com>
Signed-off-by: Allen <s96016641@gmail.com>
Signed-off-by: Alexander Schwartz <aschwart@redhat.com>
Co-authored-by: Alexander Schwartz <aschwart@redhat.com>
2025-07-28 11:47:55 +02:00
rmartinc dd17f7d811 Add a test for IdpUsernamePasswordForm in webauthn CI job
Closes #41259

Signed-off-by: rmartinc <rmartinc@redhat.com>
2025-07-24 10:39:29 -03:00
mposolda 0b98cb7466 Passkeys support in IdpUsernamePasswordForm
closes #41259

Signed-off-by: mposolda <mposolda@gmail.com>
2025-07-24 10:39:29 -03:00
Giuseppe Graziano 8fc5664115 Add id token claims to OpenID Provider Metadata claims_supported
Closes #41170

Signed-off-by: Giuseppe Graziano <g.graziano94@gmail.com>
2025-07-24 07:21:45 -03:00
mposolda 57972d85d3 Update per feedback review
Signed-off-by: mposolda <mposolda@gmail.com>
2025-07-22 10:00:37 -03:00
mposolda bba869b3d5 Fixing Re-authentication with passkeys
closes #41242
closes #41008

Signed-off-by: mposolda <mposolda@gmail.com>
2025-07-22 10:00:37 -03:00
rmartinc e0bba39da0 Allow configure encryption details for SAML clients
Closes #40933

Signed-off-by: rmartinc <rmartinc@redhat.com>
2025-07-18 20:13:40 +02:00
Takashi Norimatsu 631aebd848 FAPI 2.0 Final - only accept its issuer identifier value as a string in the aud claim received in client authentication assertions
closes #41119

Signed-off-by: Takashi Norimatsu <takashi.norimatsu.ws@hitachi.com>
2025-07-18 08:26:21 +02:00
Ryan Emerson 4bb02305c3 Implement CompatibilityMetadataProvider for Cache CLI args
Closes #41138

Signed-off-by: Ryan Emerson <remerson@redhat.com>
2025-07-16 19:52:51 +02:00
Björn Eickvonder d62d5030fe Adds log context information for MDC for realm, users, etc.
Closes #39812

Signed-off-by: Björn Eickvonder <b.eicki@gmx.net>
Signed-off-by: Alexander Schwartz <aschwart@redhat.com>
Signed-off-by: Bjoern Eickvonder <bjoern.eickvonder@inform-software.com>
Co-authored-by: Pedro Ruivo <pruivo@users.noreply.github.com>
Co-authored-by: Alexander Schwartz <aschwart@redhat.com>
2025-07-16 17:46:46 +02:00
Pedro Igor 87f30a6285 Adding a config to the UPDATE_EMAIL action to force users to verify email
Closes #32569

Signed-off-by: Pedro Igor <pigor.craveiro@gmail.com>
2025-07-16 16:21:08 +02:00
Ryan Emerson 0a745d6aeb Allow Features to declare that they support Rolling upgrades
Closes #41022

Signed-off-by: Ryan Emerson <remerson@redhat.com>
Signed-off-by: Alexander Schwartz <aschwart@redhat.com>
Co-authored-by: Alexander Schwartz <aschwart@redhat.com>
2025-07-16 12:10:29 +02:00
Takashi Norimatsu f00cd980c4 Add FAPI 2.0 + DPoP security profile as default profile of client policies
closes #35441

Signed-off-by: Takashi Norimatsu <takashi.norimatsu.ws@hitachi.com>
2025-07-16 09:30:11 +02:00
Pedro Igor d5206b61f6 Update email feature only enabled if the required action is enabled at the realm
Closes #41045

Signed-off-by: Pedro Igor <pigor.craveiro@gmail.com>
2025-07-14 16:31:15 -03:00
forkimenjeckayang a3441689e9 [OID4VCI] OpenID for Verifiable Credentials support in client settings (#39385)
Closes #32967

Signed-off-by: forkimenjeckayang <forkimenjeckayang@gmail.com>


Co-authored-by: Francis Pouatcha <francis.pouatcha@adorsys.com>
2025-07-14 11:47:10 +02:00
Giuseppe Graziano 2f36276ff0 Remove FGAP:v1 from external-internal token exchange (#40938)
Closes #40855

Signed-off-by: Giuseppe Graziano <g.graziano94@gmail.com>
2025-07-11 17:42:47 +02:00
mposolda 274afa88fa Add option 'Requires short state parameter' to OIDC IDP
closes #40237

Signed-off-by: mposolda <mposolda@gmail.com>
2025-07-11 16:17:03 +02:00
Pedro Igor 919554e6fc Resolve organization when scope is requested and the user is a member or the email domain matches the organization
Closes #39864

Signed-off-by: Pedro Igor <pigor.craveiro@gmail.com>
2025-07-10 20:38:47 +02:00
Pedro Igor 88069cd5fb Mark user session for removal when the user bound to cannot be resolved
Closes #40398

Signed-off-by: Pedro Igor <pigor.craveiro@gmail.com>
2025-07-10 20:37:18 +02:00
Pascal Knüppel f39a37d8d1 [OID4VCI] Move realm attributes to clientScope and protocol-mappers (#39768)
fixes #39527


Signed-off-by: Pascal Knüppel <pascal.knueppel@governikus.de>
Signed-off-by: Captain-P-Goldfish <captain.p.goldfish@gmx.de>
2025-07-10 14:46:36 +02:00