From 5c7482c54130ea78f4b71135f2ae8215280931e5 Mon Sep 17 00:00:00 2001 From: Alexander Schwartz Date: Tue, 23 Sep 2025 12:33:29 +0200 Subject: [PATCH] Fixed WebAuthn spelling in message resources Closes #42786 Signed-off-by: Alexander Schwartz --- .../admin/messages/messages_en.properties | 12 ++++++------ js/apps/admin-ui/test/autentication/policies.spec.ts | 4 ++-- .../theme/base/login/messages/messages_en.properties | 4 ++-- 3 files changed, 10 insertions(+), 10 deletions(-) diff --git a/js/apps/admin-ui/maven-resources/theme/keycloak.v2/admin/messages/messages_en.properties b/js/apps/admin-ui/maven-resources/theme/keycloak.v2/admin/messages/messages_en.properties index f56c66667a1..51501766bd1 100644 --- a/js/apps/admin-ui/maven-resources/theme/keycloak.v2/admin/messages/messages_en.properties +++ b/js/apps/admin-ui/maven-resources/theme/keycloak.v2/admin/messages/messages_en.properties @@ -467,7 +467,7 @@ deleteConfirmGroup_one=Are you sure you want to delete this group '{{groupName}} signDocuments=Sign documents noTokens=No initial access tokens addMapper=Add mapper -webauthnPolicy=Webauthn Policy +webauthnPolicy=WebAuthn Policy userAttributeName=User attribute name to store SAML attribute. Use email, lastName, and firstName to map to those predefined user properties. displayDescription=Display description eventTypes.DELETE_ACCOUNT.description=Delete account @@ -899,7 +899,7 @@ noPasswordPolicies=No password policies resourceTypes=Resource types deleteConfirmTitle_one=Delete group? eventTypes.UPDATE_PROFILE_ERROR.description=Update profile error -webAuthnUpdateSuccess=Updated webauthn policies successfully +webAuthnUpdateSuccess=Updated WebAuthn policies successfully authorizationSignedResponseAlg=Authorization response signature algorithm mapperTypeFullNameLdapMapperHelp=Used to map the full-name of a user from single attribute in LDAP (usually 'cn' attribute) to firstName and lastName attributes of UserModel in the Keycloak database includeInUserInfo.label=Add to userinfo @@ -993,7 +993,7 @@ missingAttributes=No {{label}} have been defined yet. Click the below button to testConnectionError=Error\! {{error}} authenticatedAccessPoliciesHelp=Those Policies are used when Client Registration Service is invoked by authenticated request. This means that the request contains Initial Access Token or Bearer Token. deleteClientPolicyProfileSuccess=Profile successfully removed from the policy. -reGenerateSigningExplain=If you regenerate signing key for client, the Keycloak database will be updated and you may need to download a new adapter for this client. +reGenerateSigningExplain=If you regenerate the signing key for client, the Keycloak database will be updated, and you may need to download a new adapter for this client. evaluate=Evaluate enableLdapv3Password=Enable the LDAPv3 password modify extended operation status=Status @@ -1039,7 +1039,7 @@ frontchannelLogoutUrl=Front-channel logout URL frontchannelLogoutSessionRequired=Front-channel logout session required frontchannelLogoutSessionRequiredHelp=Specifying whether a sid (session ID) and iss (issuer) parameters are included in the Logout request when the Front-channel Logout URL is used. testConnectionHint.withoutEmailAction=Configure e-mail address -webAuthnUpdateError=Could not update webauthn policies due to {{error}} +webAuthnUpdateError=Could not update WebAuthn policies due to {{error}} paginationHelp=Whether the LDAP server supports pagination oAuthMutualHelp=This enables support for OAuth 2.0 Mutual TLS Certificate Bound Access Tokens, which means that Keycloak binds an access token and a refresh token with an X.509 certificate of a token requesting client exchanged in mutual TLS between keycloak's Token Endpoint and this client. These tokens can be treated as Holder-of-Key tokens instead of bearer tokens. deleteProviderTitle=Delete key provider? @@ -1517,7 +1517,7 @@ regexPatternHelp=Specifies the regex pattern. searchForUserEvent=Search user event usernameLdapAttributeHelp=Name of the LDAP attribute, which is mapped as Keycloak username. For many LDAP server vendors it can be 'uid'. For Active directory it can be 'sAMAccountName' or 'cn'. The attribute should be filled for all LDAP user records you want to import from LDAP to Keycloak. federationLink=Federation link -webAuthnPolicyPasswordlessFormHelp=Policy for passwordless WebAuthn authentication. This policy is used by the 'Webauthn Register Passwordless' required action and 'WebAuthn Passwordless Authenticator' authenticator. A typical usage is when WebAuthn is used as first-factor authentication. Having both 'WebAuthn Policy' and 'WebAuthn Passwordless Policy' allows using WebAuthn as both first factor and second factor authenticator in the same realm. +webAuthnPolicyPasswordlessFormHelp=Policy for passwordless WebAuthn authentication. This policy is used by the 'WebAuthn Register Passwordless' required action and 'WebAuthn Passwordless Authenticator' authenticator. A typical usage is when WebAuthn is used as first-factor authentication. Having both 'WebAuthn Policy' and 'WebAuthn Passwordless Policy' allows using WebAuthn as both first factor and second factor authenticator in the same realm. unlinkUsersError=Could not unlink users\: '{{error}}' roleHelpHelp=Role to grant to user. Click 'Select Role' button to browse roles, or just type it in the textbox. To reference an application role the syntax is appname.approle, i.e. myapp.myrole. storedTokensReadable=Stored tokens readable @@ -2722,7 +2722,7 @@ ecdsaGenerated=ecdsca-generated flow-type.basic-flow=Generic oAuthDevicePollingInterval=OAuth 2.0 Device Polling Interval deletedSuccessRealmSetting=The realm has been deleted -webauthnPasswordlessPolicy=Webauthn Passwordless Policy +webauthnPasswordlessPolicy=WebAuthn Passwordless Policy editUserLabel=Edit User Label Button conditions=Conditions addUri=Add URI diff --git a/js/apps/admin-ui/test/autentication/policies.spec.ts b/js/apps/admin-ui/test/autentication/policies.spec.ts index 0743b4669ec..2542d3833f9 100644 --- a/js/apps/admin-ui/test/autentication/policies.spec.ts +++ b/js/apps/admin-ui/test/autentication/policies.spec.ts @@ -72,7 +72,7 @@ test.describe.serial("Webauthn policies tabs", () => { await assertNotificationMessage( page, - "Updated webauthn policies successfully", + "Updated WebAuthn policies successfully", ); }); @@ -89,7 +89,7 @@ test.describe.serial("Webauthn policies tabs", () => { await assertNotificationMessage( page, - "Updated webauthn policies successfully", + "Updated WebAuthn policies successfully", ); }); }); diff --git a/themes/src/main/resources/theme/base/login/messages/messages_en.properties b/themes/src/main/resources/theme/base/login/messages/messages_en.properties index 30896a4b908..b994b78b8a6 100644 --- a/themes/src/main/resources/theme/base/login/messages/messages_en.properties +++ b/themes/src/main/resources/theme/base/login/messages/messages_en.properties @@ -407,8 +407,8 @@ requiredAction.UPDATE_PROFILE=Update Profile requiredAction.VERIFY_EMAIL=Verify Email requiredAction.delete_account=Delete Account requiredAction.UPDATE_EMAIL=Update Email -requiredAction.webauthn-register=Webauthn Register -requiredAction.webauthn-register-passwordless=Webauthn Register Passwordless +requiredAction.webauthn-register=WebAuthn Register +requiredAction.webauthn-register-passwordless=WebAuthn Register Passwordless requiredAction.VERIFY_PROFILE=Verify Profile requiredAction.delete_credential=Delete Credential requiredAction.idp_link=Linking Identity Provider