mirror of
https://github.com/keycloak/keycloak.git
synced 2026-01-10 15:32:05 -03:30
'Service accounts roles' should be 'Service account roles'
closes #43087 Signed-off-by: mposolda <mposolda@gmail.com>
This commit is contained in:
parent
a19f4d00fc
commit
c2e49c8c59
@ -20,7 +20,7 @@ Roles assigned to the user can be defined in the Role mappings as described in <
|
||||
* In case that a role is a <<_composite-roles,composite role>>, the child roles of the composite role are also applied. In the token, the list of the roles is expanded and would contain all the roles.
|
||||
|
||||
* In case that the authenticated user is not a normal user, but a <<_service_accounts,Service account>>, which represents a client, then the service account roles are used. The service account roles are defined
|
||||
in the tab *Service accounts roles* of the particular client.
|
||||
in the tab *Service account roles* of the particular client.
|
||||
|
||||
== Role protocol mappers
|
||||
|
||||
|
||||
@ -12,7 +12,7 @@ Each OIDC client has a built-in _service account_. Use this _service account_ to
|
||||
. Select your client.
|
||||
. Click the *Settings* tab.
|
||||
. Toggle <<_access-type, Client authentication>> to *On*.
|
||||
. Select *Service accounts roles* checkbox to make sure it is enabled.
|
||||
. Select *Service account roles* checkbox to make sure it is enabled.
|
||||
. Click *Save*.
|
||||
. Configure your <<_client-credentials, client credentials>>.
|
||||
. Click the *Client Scopes* tab, select the dedicated client scope (usually first client scope in the list, more details <<_client_scopes_dedicated,in this section>>) and select *Scope* tab of the client scope.
|
||||
|
||||
@ -1140,7 +1140,7 @@ eventTypes.UPDATE_TOTP_ERROR.name=Update totp error
|
||||
client-updater-source-groups.tooltip=Name of groups to check. The condition evaluates to true if the entity who creates or updates the client is a member of one or more of the specified groups. Configured groups are specified by their simple name, which must match the name of the Keycloak group. No support for group hierarchy is used here.
|
||||
webAuthnPolicyRpId=Relying party ID
|
||||
ldapRolesDnHelp=LDAP DN where roles of this tree are saved. For example, 'ou\=finance,dc\=example,dc\=org'.
|
||||
serviceAccount=Service accounts roles
|
||||
serviceAccount=Service account roles
|
||||
standardTokenExchangeEnabled=Standard Token Exchange
|
||||
enableRefreshRequestedTokenType=Allow refresh token in Standard Token Exchange
|
||||
providerUpdatedSuccess=Client policy updated successfully
|
||||
|
||||
Loading…
x
Reference in New Issue
Block a user