Pedro Igor
dbb0179a93
Aligning partial evaluation with the outcome from regular evaluations
...
Closes #38626
Signed-off-by: Pedro Igor <pigor.craveiro@gmail.com >
2025-04-03 12:07:30 -03:00
Pedro Igor
61cb0acbc4
Fixing inconsistencies when evaluating permission in the evaluation tab
...
Closes #38498
Signed-off-by: Pedro Igor <pigor.craveiro@gmail.com >
2025-04-01 11:40:27 -03:00
Alexander Schwartz
85737f52b5
Make access Token in user info endpoint bound to the dpop proof
...
Closes #38333
Signed-off-by: Alexander Schwartz <aschwart@redhat.com >
2025-03-31 09:41:57 +02:00
Steven Hawkins
06e0885f46
fix: adds back reporting of non-ip client addresses ( #37797 )
...
closes : #36843
Signed-off-by: Steve Hawkins <shawkins@redhat.com >
# Conflicts:
# services/src/main/java/org/keycloak/protocol/oidc/tokenexchange/AbstractTokenExchangeProvider.java
# services/src/main/java/org/keycloak/protocol/oidc/tokenexchange/StandardTokenExchangeProvider.java
2025-03-27 19:33:20 +00:00
Tero Saarni
c7f0fc7ac3
Support EC in PEM utils
...
This change adds
- Support for decoding EC private keys.
- Support for decoding certificate bundles.
Closes #38490
Signed-off-by: Tero Saarni <tero.saarni@est.tech >
2025-03-27 15:44:05 +01:00
Ricardo Martin
19f9331e88
Re-add messages for recovery codes credential in the account console
...
Closes #38381
Signed-off-by: rmartinc <rmartinc@redhat.com >
2025-03-26 16:05:39 +01:00
Thomas Richner
9920aa248e
fixes incorrect JWK thumprint computation
...
Closes #38394
Signed-off-by: Thomas Richner <thomas.richner@oviva.com >
2025-03-25 20:55:54 +01:00
Pedro Igor
77ef5ff795
Returning the denied scopes and the friendly name for resources
...
Signed-off-by: Pedro Igor <pigor.craveiro@gmail.com >
2025-02-27 14:12:45 -03:00
mposolda
f03f511844
Polishing support for id-token in standard token exchange
...
closes #37113
Signed-off-by: mposolda <mposolda@gmail.com >
2025-02-19 14:44:29 +01:00
Pedro Igor
602df06191
Allows querying credential from user storage providers
...
Closes #35020
Signed-off-by: Pedro Igor <pigor.craveiro@gmail.com >
2025-02-05 07:56:05 -03:00
Arthenice
c20f7e50c7
docs: update JavaDoc for ImportSynchronization
...
The JavaDoc for ImportSynchronization was wrongfully referencing the
UserStorageProvider instead of the UserStorageProviderFactory.
Closes #36834
Signed-off-by: arthenice <wistful.arthenice@gmail.com >
2025-01-28 12:13:19 +01:00
Stian Thorgersen
fc2b9018f1
Extend REST API for login and admin events to support sync scenarios ( #36601 )
...
Closes #36600
Signed-off-by: stianst <stianst@gmail.com >
2025-01-20 14:32:55 +01:00
Stian Thorgersen
c1c147cb17
Restrict access to environment variables when at the server runtime ( #36472 )
...
Signed-off-by: Pedro Igor <pigor.craveiro@gmail.com >
Co-authored-by: Pedro Igor <pigor.craveiro@gmail.com >
2025-01-15 09:36:19 +01:00
vramik
0a632fdefa
[FGAP] Add adminPermissionClientCheck to authorization services REST endpoints
...
Closes #35945
Signed-off-by: vramik <vramik@redhat.com >
2025-01-10 08:56:48 -03:00
Ingrid Kamga
206436fde9
Offload format-specific credential building to dedicated credential builder providers ( #32951 ) ( #35046 )
...
Closes #32951
Signed-off-by: Ingrid Kamga <Ingrid.Kamga@adorsys.com >
2024-12-19 12:42:41 +01:00
Pedro Igor
93c1740538
Support for initial CRUD operations when managing admin permissions
...
Signed-off-by: Pedro Igor <pigor.craveiro@gmail.com >
Closes #35987
2024-12-18 07:43:13 -03:00
Thomas Darimont
3cdbbc5b15
Add support for Initiating User Registration via prompt=create ( #10701 ) ( #35903 )
...
Fixes #10701
Signed-off-by: Thomas Darimont <thomas.darimont@googlemail.com >
2024-12-16 19:54:52 +01:00
vramik
044807f162
[FGAP] Create new internal client which would hold the authorization objects for feature V2
...
Closes #34565
Signed-off-by: vramik <vramik@redhat.com >
2024-12-05 11:56:13 -03:00
Thomas Darimont
f61937f3d9
Prefer usage of StandardCharsets.UTF_8 over "UTF-8" charset reference
...
Fixes #35080
Signed-off-by: Thomas Darimont <thomas.darimont@googlemail.com >
Signed-off-by: Alexander Schwartz <aschwart@redhat.com >
Co-authored-by: Alexander Schwartz <aschwart@redhat.com >
2024-11-25 10:45:37 +00:00
vramik
440e81c8b9
Add a realm-level setting to enable FGAP to a realm
...
Closes #34920
Signed-off-by: vramik <vramik@redhat.com >
2024-11-19 09:59:34 -03:00
Awambeng
cfd187b0ff
Introduce SdJwtFacade layer for simplified SD-JWT handling and enhance test coverage ( #34915 )
...
Closes #32955
Signed-off-by: Awambeng Rodrick <awambengrodrick@gmail.com >
2024-11-15 15:20:10 +01:00
rmartinc
c1d4dad4dc
Avoid MRJAR in keycloak-core
...
Closes #34630
Signed-off-by: rmartinc <rmartinc@redhat.com >
2024-11-15 15:16:56 +01:00
vramik
9050172448
[FGAP] First draft of Authorization Schema
...
Closes #34569
Signed-off-by: vramik <vramik@redhat.com >
2024-11-14 07:52:37 -03:00
Pedro Igor
d04f7900f5
added membershipType to members list and membership type filter
...
Signed-off-by: Agnieszka Gancarczyk <agagancarczyk@gmail.com >
Co-authored-by: Pedro Igor <pigor.craveiro@gmail.com >
Signed-off-by: Pedro Igor <pigor.craveiro@gmail.com >
Signed-off-by: Pedro Igor <pigor.craveiro@gmail.com >
2024-11-12 09:13:18 -03:00
Marek Posolda
92d9ac6621
Update KEYCLOAK_SESSION cookie to not have sessionId in plaintext ( #34551 )
...
closes #34026
Signed-off-by: mposolda <mposolda@gmail.com >
2024-11-11 18:47:18 +01:00
rmartinc
e6ffc04cac
Do not calculate thumbprints for certificates if not needed
...
Closes #34776
Signed-off-by: rmartinc <rmartinc@redhat.com >
2024-11-11 10:37:05 +01:00
Pedro Igor
0a05ba49d1
Adding a details map to admin events to store additional contextual data when the event is fired
...
Signed-off-by: Pedro Igor <pigor.craveiro@gmail.com >
2024-11-07 17:19:43 -03:00
Robert Rieser
42fcc64bac
issue-34013: Added a representation that includes an organization and user model, as well as included it in the event body for removing and adding of members to an organization
...
https://github.com/keycloak/keycloak/issues/34013
Signed-off-by: Robert Rieser <Robert.Rieser@degoya.studio >
2024-11-07 17:19:43 -03:00
Thomas Darimont
3315ea718a
Add ability to enable OID4VCI Verifiable Credentials per realm ( #34524 )
...
- Added new realm property verifiableCredentialsEnabled
- Updated RealmRepresentation
- Guarded route to Oid4VCI page
- Add boolean switch to Realm settings page to control Verifiable Credentials enablement
- We now only show the Verifiable Credentials page in the nave if the "Verifiable Credentials" realm setting is enabled.
Fixes #34524
Signed-off-by: Thomas Darimont <thomas.darimont@googlemail.com >
2024-11-04 14:58:30 +01:00
Ingrid Kamga
c4d6979907
Scaffold verification of SD-JWT VP token ( #29859 ) ( #33752 )
...
Closes #29859
Signed-off-by: Ingrid Kamga <Ingrid.Kamga@adorsys.com >
2024-10-25 14:49:25 +02:00
Gilvan Filho
c4005d29f0
add linear strategy to brute force
...
closes #25917
Signed-off-by: Gilvan Filho <gilvan.sfilho@gmail.com >
2024-10-22 10:33:22 -03:00
rmartinc
6d52520730
Load client keys using SubjectPublicKeyInfo and upload jwks type into the jwks attributes for OIDC ones
...
Closes #33820
Signed-off-by: rmartinc <rmartinc@redhat.com >
2024-10-22 14:24:15 +02:00
Pascal Knüppel
41ee68611f
Allow to create EC certificates if new EC-key-provider is created ( #31843 )
...
Closes #31842
Signed-off-by: Pascal Knüppel <pascal.knueppel@governikus.de >
2024-10-17 16:05:59 +02:00
Thomas Darimont
40bdc902f0
Use account-console client for server-side auth check
...
Also generate PKCE verifier and use challenge parameters
Signed-off-by: Thomas Darimont <thomas.darimont@googlemail.com >
2024-10-17 07:53:20 -03:00
Thomas Darimont
729417b20a
Use account-console client for server-side auth check
...
- Also generate PKCE verifier and use challenge parameters
Signed-off-by: Thomas Darimont <thomas.darimont@googlemail.com >
2024-10-17 07:53:20 -03:00
Ogen Bertrand
304da50efc
Implement SdJwtVP.of(String) with enhanced error handling
...
This update includes validation for missing disclosures, duplicate disclosure digests, and malformed disclosure data, improving overall robustness and error handling during disclosure processing.
Closes #33020
Signed-off-by: Ogenbertrand <ogenbertrand@gmail.com >
2024-10-07 16:40:54 +02:00
Maksim Zvankovich
35eba8be8c
Add option to include the organization id in the organization claims
...
Closes #32746
Signed-off-by: Maksim Zvankovich <m.zvankovich@nexovagroup.eu >
Co-authored-by: Stefan Guilhen <sguilhen@redhat.com >
2024-10-03 08:11:36 -03:00
vramik
c1653448f3
[Organizations] Allow orgs to define the redirect URL after user registers or accepts invitation link
...
Closes #33201
Signed-off-by: vramik <vramik@redhat.com >
2024-10-02 07:37:48 -03:00
rmartinc
c532751ff4
Downgrade Java for client libraries to 8
...
Closes #33051
Signed-off-by: rmartinc <rmartinc@redhat.com >
2024-09-20 17:01:01 +02:00
Pedro Ruivo
f67bec0417
Rename remote-cache Feature
...
Renamed to "clusterless"
Closes #32596
Signed-off-by: Pedro Ruivo <pruivo@redhat.com >
2024-09-13 13:03:13 +02:00
Stefan Guilhen
e7a4635620
Filter out org brokers from the account console
...
- org-linked brokers should not be available for login
- prepare the endpoint for search/pagination
Closes #31944
Signed-off-by: Stefan Guilhen <sguilhen@redhat.com >
2024-09-04 09:00:52 -03:00
mposolda
dad4477995
Remove keycloak-core and keycloak-crypto-default from SAML galleon feature pack and upgrade them to Java 17
...
closes #32586
Signed-off-by: mposolda <mposolda@gmail.com >
2024-09-03 15:58:57 +02:00
keshavprashantdeshpande
058c2717a0
Add setter for frontChannelLogoutSupported and frontChannelLogoutSessionSupported ( #32532 )
...
Closes #30178
Signed-off-by: keshavprashantdeshpande <vaidehidabir@gmail.com >
2024-09-02 12:18:01 +00:00
Erik Jan de Wit
776a491989
added organizations table to account ( #32311 )
...
* added organizations table to account
Signed-off-by: Erik Jan de Wit <erikjan.dewit@gmail.com >
Signed-off-by: Pedro Igor <pigor.craveiro@gmail.com >
Co-authored-by: Pedro Igor <pigor.craveiro@gmail.com >
2024-08-22 15:44:03 -03:00
Pedro Igor
eeae50fb43
Make sure federationLink always map to the storage provider associated with federated users
...
Closes #31670
Signed-off-by: Pedro Igor <pigor.craveiro@gmail.com >
2024-08-20 11:27:22 +02:00
Stefan Guilhen
f82159cf65
Rework logic to fetch IDPs for the login page so that IDPs are fetched from the provider and not filtered in code.
...
Closes #32090
Signed-off-by: Stefan Guilhen <sguilhen@redhat.com >
2024-08-19 09:06:35 -03:00
mposolda
54a538b3ad
Update RolePolicyRepresentation fields from 'boolean' to 'Boolean'
...
closes #32117
Signed-off-by: mposolda <mposolda@gmail.com >
2024-08-14 13:11:06 +02:00
rmartinc
2a06e1a6db
Add SHAKE256 hash provider for Ed448
...
Closes #31931
Signed-off-by: rmartinc <rmartinc@redhat.com >
2024-08-08 17:36:54 +02:00
Justin Tay
966a454548
Add ECDH-ES JWE Algorithm Provider, Add generated ECDH key provider ( #23928 )
...
Closes #23596
Closes #23597
Signed-off-by: Justin Tay <49700559+justin-tay@users.noreply.github.com >
2024-08-08 17:29:35 +02:00
Pascal Knüppel
bf951a5554
Fix certificate creation with cross-keys ( #31866 )
...
fixes #31864
Signed-off-by: Pascal Knüppel <pascal.knueppel@governikus.de >
2024-08-07 12:41:12 +02:00