stianst
7dca54e8dc
Set version to 26.0.11
2025-04-24 14:12:15 +02:00
mposolda
b329e6e79a
Make sure Cancel AIA does not remove required action from user
...
Signed-off-by: mposolda <mposolda@gmail.com>
(cherry picked from commit 5e0915854348c9cb95519d5d2d04b41ee97605db)
2025-04-24 11:44:46 +02:00
Steve Hawkins
f835f49065
fix: remove ANY mode modification of truststores
...
also note that ANY should not be used in production
closes: CVE-2025-3501
Add a test for the error (#1 )
Signed-off-by: Ricardo Martin <rmartinc@redhat.com>
Update docs/guides/server/keycloak-truststore.adoc
Co-authored-by: Marek Posolda <mposolda@gmail.com>
Signed-off-by: Steven Hawkins <shawkins@redhat.com>
2025-04-24 11:44:33 +02:00
Venelin Cvetkov
4ae7d60784
Add config param disableTypeClaimCheck in order to validate external tokens without typ claim
...
Closes #33332
Signed-off-by: Venelin Cvetkov <venelin.tsvetkov@gmail.com>
(cherry picked from commit d388dc79361cd8ba2ace049bd888334faf253552)
2025-04-17 15:11:25 +02:00
rmartinc
2a845aa2b5
Migrate old recaptcha secret name when used
...
Closes #38607
Signed-off-by: rmartinc <rmartinc@redhat.com>
(cherry picked from commit ba91a092ab6a8266a89be254405d3a6d64dcce85)
2025-04-09 13:56:19 +02:00
Alexander Schwartz
b62e2f3e8e
Set the mail.from to avoid looking up the local hostname
...
Closes #38353
Signed-off-by: Alexander Schwartz <aschwart@redhat.com>
2025-04-03 11:53:38 -03:00
rmartinc
154206c5f3
Define a max expiration window for Signed JWT client authentication
...
Closes #38576
Signed-off-by: rmartinc <rmartinc@redhat.com>
(cherry picked from commit a10c8119d4452b866b90a9019b2cc159919276ca)
2025-04-03 13:24:12 +02:00
Pedro Igor
44f18467d5
Only set organization to client session when re-authenticating if user is member of the mapped organization
...
Closes #37169
Signed-off-by: Pedro Igor <pigor.craveiro@gmail.com>
2025-02-14 15:38:22 +00:00
Ricardo Martin
707a556828
Force login in reset-credentials to federated users
...
Closes #37207
Signed-off-by: rmartinc <rmartinc@redhat.com>
(cherry picked from commit 6850f410605d79ea1fa98ea20774056e3a210217)
2025-02-13 08:31:06 +00:00
Ricardo Martin
66a6248d51
Provide an option to force login after reset credentials ( #36856 )
...
Closes #36844
Signed-off-by: rmartinc <rmartinc@redhat.com>
Co-authored-by: Ricardo Martin <rmartinc@redhat.com>
Co-authored-by: andymunro <48995441+andymunro@users.noreply.github.com>
Co-authored-by: Marek Posolda <mposolda@gmail.com>
Signed-off-by: Marek Posolda <mposolda@gmail.com>
2025-01-29 10:05:00 +01:00
Pedro Igor
3122e4d18d
Remember the organization once selected when reloading pages
...
Closes #36629
Signed-off-by: Pedro Igor <pigor.craveiro@gmail.com>
2025-01-24 17:36:57 +01:00
Pedro Igor
4df89c5f47
Support for the login_hint parameter in the identity-first login page
...
Closes #36649
Signed-off-by: Pedro Igor <pigor.craveiro@gmail.com>
2025-01-24 13:58:44 +01:00
Alexander Schwartz
2a3dc2c643
Avoid both loggingan error and throwing an exception ( #36753 )
...
Closes #36728
Signed-off-by: Alexander Schwartz <aschwart@redhat.com>
2025-01-24 09:51:32 +01:00
Pedro Igor
cc6ed54bc3
Allow using a custom scope name when mapping organization to tokens
...
Closes #36514
Signed-off-by: Pedro Igor <pigor.craveiro@gmail.com>
2025-01-23 13:50:36 +01:00
rmartinc
f3b86833fd
Check next update time for CRL in certificate validation
...
Closes #35983
Signed-off-by: rmartinc <rmartinc@redhat.com>
2025-01-23 10:30:44 +01:00
Pedro Igor
3e604cf27d
Allow enforce that users are members of organizations when authenticating
...
Closes #34275
Signed-off-by: Pedro Igor <pigor.craveiro@gmail.com>
2025-01-22 21:49:30 +01:00
Pedro Igor
676f2a0469
Error when re-authenticating when organization is enabled
...
Closes #36249
Signed-off-by: Pedro Igor <pigor.craveiro@gmail.com>
2025-01-17 15:36:36 +00:00
Pedro Igor
30b3afbf69
Re-calculate the organization scope when re-authenticating in the browser flow
...
Closes #35935
Closes #35830
Signed-off-by: Pedro Igor <pigor.craveiro@gmail.com>
2025-01-14 09:43:40 +01:00
Stefan Guilhen
a0318812d9
Update UP via provider instead of going through the UserProfileResource
...
- prevents error when updating realm
Closes #34540
Signed-off-by: Stefan Guilhen <sguilhen@redhat.com>
(cherry picked from commit abf0eb7f92e83f6c081c4378f2b715c3b480320a)
2025-01-13 14:41:53 -03:00
Martin Kanis
1cd854fe73
Incomplete registration form when edit email is disabled and email is set as username
...
Closes #34876
Signed-off-by: Martin Kanis <mkanis@redhat.com>
(cherry picked from commit dbd94292560d91eb57d29dd2f9fab0de4bd605df)
2025-01-13 14:24:10 -03:00
Pedro Igor
99775848f6
Fix NPE when exchanging external using the issuer value
...
Closes #36053
Signed-off-by: Pedro Igor <pigor.craveiro@gmail.com>
2025-01-13 17:52:25 +01:00
Martin Kanis
d1c7a9b347
Translations specified in the admin console do not override the translations specified in a theme ( #36275 )
...
Closes #36037
Signed-off-by: Martin Kanis <mkanis@redhat.com>
(cherry picked from commit 03b6f4b306102184127c2acbd319077e5036c13d)
2025-01-13 17:50:35 +01:00
Steven Hawkins
0ba546d384
Remove the use of regex for determining local addresses ( #36228 ) ( #36282 )
...
Closes #36227
Signed-off-by: Steve Hawkins <shawkins@redhat.com>
(cherry picked from commit 696bc0710336da15ecaa9c66df2d9f2f8404c7f8)
2025-01-13 17:49:06 +01:00
Martin Bartoš
ed16c89b7d
Upgrade to Quarkus 3.15.2 ( #36246 )
...
Closes #35077
Closes #33469
Closes #36009
Signed-off-by: Martin Bartoš <mabartos@redhat.com>
2025-01-13 17:47:58 +01:00
Marek Posolda
3e4cbfac14
Failed to authenticate client with method client_secret_jwt when client has keys generated ( #35992 )
...
closes #34547
Signed-off-by: mposolda <mposolda@gmail.com>
(cherry picked from commit 9b01e958dc73ab7634c4e49b5730cd9cd579129a)
2025-01-13 17:47:03 +01:00
Pedro Igor
caec411d9b
Better path parameter names for organization and member APIs
...
Closes #35745
Signed-off-by: Pedro Igor <pigor.craveiro@gmail.com>
2025-01-13 17:45:49 +01:00
mposolda
f9dcfbd59c
Token revocation may not correctly revoke related access tokens
...
closes #35813
Signed-off-by: mposolda <mposolda@gmail.com>
(cherry picked from commit efdc42c2a4132b9c8c953c2ed0bea9d71dcb848e)
2025-01-13 17:43:18 +01:00
mposolda
0bd989fd0e
When using the token revocation endpoint with refresh-token, only particular clientSession related to given refresh token should be terminated
...
closes #35486
Signed-off-by: mposolda <mposolda@gmail.com>
(cherry picked from commit 3fca2f3b7f132bb775a2158e978a3a546b887d7c)
2025-01-13 17:43:18 +01:00
Giuseppe Graziano
4e13c0bbd3
Avoid a NullPointerException when client roles are associated with a client that no longer exists ( #35489 )
...
Closes #34444
Signed-off-by: Giuseppe Graziano <g.graziano94@gmail.com>
(cherry picked from commit 8f417d63183369f84cc6cdab1b0843d470c07c43)
Co-authored-by: Marek Posolda <mposolda@gmail.com>
2025-01-13 17:29:37 +01:00
Pedro Igor
7a76858fe4
Restrict access to environment variables when at the server runtime
...
Signed-off-by: Pedro Igor <pigor.craveiro@gmail.com>
2024-12-16 10:12:52 -03:00
mposolda
edbf75e6ee
Keycloak arquillian testsuite not working with the default embedded undertow
...
closes #35802
Signed-off-by: mposolda <mposolda@gmail.com>
2024-12-16 10:12:52 -03:00
Douglas Palmer
93b2a7327b
EMBARGOED CVE-2024-11734 org.keycloak/keycloak-quarkus-server: Denial of Service in Keycloak Server via Security Headers ( #228 )
...
Signed-off-by: Douglas Palmer <dpalmer@redhat.com>
2024-12-13 10:43:31 +01:00
rmartinc
e96ffa1c42
Set clientId in the VerifyEmailActionToken when no one is passed
...
Closes #35317
Signed-off-by: rmartinc <rmartinc@redhat.com>
(cherry picked from commit d19ba82779a1d80a0ef2b1f464744eb73ce7ad62)
2024-12-10 12:59:25 +01:00
Steven Hawkins
0bd8a1fec9
fix: using regex to expand local ipv6 matching ( #35736 ) ( #35737 )
...
closes : #35675
Signed-off-by: Steve Hawkins <shawkins@redhat.com>
(cherry picked from commit 80890737d48a40d790d7594989c3f6eae567c442)
2024-12-09 19:39:53 +01:00
Steven Hawkins
c6d06e0226
fix: changing the bootstrapping suggestion to the command ( #35616 ) ( #35666 )
...
closes : #35526
Signed-off-by: Steve Hawkins <shawkins@redhat.com>
(cherry picked from commit 4c7dea5d708bab3f5df5afe671c94ca7cf9166d8)
2024-12-06 11:25:21 +01:00
Martin Kanis
4fd52adc8c
Intermittent missing organization claim in Keycloak JWT token
...
Closes #35324
Signed-off-by: Martin Kanis <mkanis@redhat.com>
(cherry picked from commit 2482302d4dbc805aa84b0be70fd0db48563fad3f)
2024-12-04 16:37:46 -03:00
rmartinc
68d979882e
Create a new logout session when initiating it for another client
...
Closes #34207
Signed-off-by: rmartinc <rmartinc@redhat.com>
(cherry picked from commit e41553bcfb943f6658f1928e52dd96b4fa1420bf)
2024-12-03 12:24:35 +01:00
Venkatesh Kannan
1fae6be539
Persist admin event only when roles is non-empty
...
Currently, an adminEvent is created regardless of if the roles passed to the
role-mapping API is empty. The event should only be created when the list
`roles` is non-empty.
Closes #33195
Signed-off-by: Venkatesh Kannan <venkatesprasad512@gmail.com>
2024-11-29 15:59:58 +01:00
Rishabh Singh
babd6563a0
setting the user in ExecuteActionsActionTokenHandler.handleToken to manage user null case in FreeMarkerLoginFormsProvider.createResponse
...
Closes #17233
Signed-off-by: Rishabh Singh <rishabhsvats@gmail.com>
(cherry picked from commit 8cad78b1dfff5b9154d0068702544e6ef62cbc29)
2024-11-29 13:11:17 +01:00
rmartinc
73ed0613ee
Do not count current sessions in UserSessionLimitsAuthenticator
...
Closes #35276
Signed-off-by: rmartinc <rmartinc@redhat.com>
(cherry picked from commit 8a4651c6643aae60abc9e6773e04ae084c4a2b09)
2024-11-28 13:02:39 +01:00
Agnieszka Gancarczyk
f0243a8c0b
Backport to expose membership type
...
Signed-off-by: Agnieszka Gancarczyk <agagancarczyk@gmail.com>
2024-11-27 11:15:25 -03:00
Pedro Igor
3a9cc8e3bd
Make sure unmanaged attributes are populated before updating username when in update email context
...
Closes #34930
Signed-off-by: Pedro Igor <pigor.craveiro@gmail.com>
2024-11-22 12:18:17 +01:00
Ricardo Martin
154e14122f
Check the authentication config exists before returning its reference
...
Closes #34888
(cherry picked from commit 8d559d542c1b4f3f030caa1b11c7d8bc9717618b)
Signed-off-by: rmartinc <rmartinc@redhat.com>
2024-11-22 12:11:42 +01:00
Jon Koops
cd8a801a85
Ignore Accept-Language header for email themes
...
Closes #10233
(cherry picked from commit 84f60bc121bc815711b615723833e19fd29838ac)
Signed-off-by: Giuseppe Graziano <g.graziano94@gmail.com>
Co-authored-by: Giuseppe Graziano <g.graziano94@gmail.com>
2024-11-22 12:08:45 +01:00
Giuseppe Graziano
63180be938
Check "Always use lightweight access token" is enabled on the client for Admin REST APIs
...
Closes #34944
Signed-off-by: Giuseppe Graziano <g.graziano94@gmail.com>
(cherry picked from commit 5d600be6f2b34c5bcb4093af37005903db26cef0)
2024-11-22 12:07:31 +01:00
Pedro Igor
cc64375c88
Allow returning attributes when querying organizations
...
Closes #34590
Signed-off-by: Himanshi Gupta <higupta@redhat.com>
Signed-off-by: Pedro Igor <pigor.craveiro@gmail.com>
Co-authored-by: Himanshi Gupta <higupta@redhat.com>
2024-11-22 11:50:28 +01:00
Peter Zaoral
7bdc16f029
fix: prevent inclusion of characters that could lead to FileVault path traversal ( #212 )
...
Closes : #211
Signed-off-by: Peter Zaoral <pzaoral@redhat.com>
Co-authored-by: Václav Muzikář <vmuzikar@redhat.com>
2024-11-18 09:27:50 +01:00
Steven Hawkins
6a10c0e345
fix: returning addresses instead of hosts on the ClientConnection ( #208 )
...
also consolidates checks of whether a host or address is local
closes: #CVE-2024-9666
Signed-off-by: Steve Hawkins <shawkins@redhat.com>
2024-11-18 09:25:44 +01:00
Douglas Palmer
b956819187
EMBARGOED CVE-2024-10270 org.keycloak/keycloak-services: Keycloak Denial of Service ( #214 )
...
Closes #CVE-2024-10270
Signed-off-by: Douglas Palmer <dpalmer@redhat.com>
2024-11-14 09:47:04 +01:00
Erik Jan de Wit
12890936cb
add brute force enabled so we can render switch ( #34282 ) ( #34476 )
...
fixes : #34065
Signed-off-by: Erik Jan de Wit <erikjan.dewit@gmail.com>
(cherry picked from commit 4d25128018305f9b7fadc692d6e370b663402a68)
2024-11-12 10:51:19 +01:00