Commit Graph

231 Commits

Author SHA1 Message Date
rmartinc
4730dbdd8d Make recovery codes supported
Closes #38994

Signed-off-by: rmartinc <rmartinc@redhat.com>
2025-04-29 10:25:46 +02:00
Alexander Schwartz
050d3ccba4
Fix broken link for XOAUTH2 configuration
Closes #39096

Signed-off-by: Alexander Schwartz <aschwart@redhat.com>
2025-04-23 08:47:40 +02:00
Marek Posolda
025b2ba442
Introducing IdpLinkAction as AIA to replace client-initiated account linking (#38952)
closes #37269
closes #35446

Signed-off-by: mposolda <mposolda@gmail.com>


Co-authored-by: andymunro <48995441+andymunro@users.noreply.github.com>
Signed-off-by: Marek Posolda <mposolda@gmail.com>
2025-04-17 13:20:05 +02:00
Alexander Schwartz
a312632468
Add new user event metrics to the release notes
Closes #39027

Signed-off-by: Alexander Schwartz <aschwart@redhat.com>
2025-04-17 10:58:34 +02:00
Alexander Schwartz
2be2958b8e
Update release notes docs for removed remote store
Closes #39028

Signed-off-by: Alexander Schwartz <aschwart@redhat.com>
2025-04-17 10:56:29 +02:00
Pedro Igor
1ba8fe16ac
Deprecate for removal Instagram Identity Broker (#38998)
Closes #37967
Closes #36562

Signed-off-by: Pedro Igor <pigor.craveiro@gmail.com>
2025-04-17 09:07:06 +02:00
Martin Bartoš
60fb7a5fa7
Support asynchronous logging (#38094)
Closes #38578

Closes #28851

Signed-off-by: Martin Bartoš <mabartos@redhat.com>
2025-04-16 15:08:15 +00:00
Michal Hajas
4dc4de7c12
Remove CACHE-EMBEDDED-REMOTE-STORE experimental feature
Closes #34160

Signed-off-by: Michal Hajas <mhajas@redhat.com>
2025-04-16 12:01:55 +00:00
Thomas Darimont
478e0b3264 Make sure that there is single audience allowed by default in JWT tokens sent to client authentication
closes #38819

Signed-off-by: mposolda <mposolda@gmail.com>

Co-authored-by: Thomas Darimont <thomas.darimont@googlemail.com>
Co-authored-by: mposolda <mposolda@gmail.com>
2025-04-10 18:08:10 +02:00
vramik
f076b99407 FGAP documentation
Closes #37245

Signed-off-by: vramik <vramik@redhat.com>
2025-04-03 09:44:32 -03:00
mposolda
cd4e5bc784 Release notes for oid4vci docs
closes #38485

Signed-off-by: mposolda <mposolda@gmail.com>
2025-03-29 19:25:24 +01:00
mposolda
11cb332964 Release notes updates for the community contributions related to core-clients areas
closes #38374

Signed-off-by: mposolda <mposolda@gmail.com>
2025-03-24 12:49:52 +01:00
Laurids Møller Jepsen
8f7c1871a7 Add client OIDC configuration for setting the header type in access tokens.
If this setting is On, the access token header type will be "at+jwt" in compliance with RFC 9068, see https://datatracker.ietf.org/doc/html/rfc9068#section-2.1. If the setting is Off, the access token header type will be "JWT". The setting is Off per default.

Closes #36696

Signed-off-by: Laurids Møller Jepsen <laurids.jepsen@cryptomathic.com>
2025-03-24 10:35:41 +01:00
Sebastian Rose
4fb1c41155 Sending Mails via SMTP and XOAUTH2 authentication mechanism
Closes #17432

Signed-off-by: Sebastian Rose <sebastian.rose@gmail.com>
2025-03-21 10:12:18 +01:00
Stian Thorgersen
a18948f731
Reorder items in release notes for 26.2 (#38290)
Signed-off-by: stianst <stianst@gmail.com>
2025-03-20 11:52:53 +01:00
Alexander Schwartz
c9b88c6bf6
Finalizing release notes and documentation for initial rolling update
Some checks are pending
Weblate Sync / Trigger Weblate to pull the latest changes (push) Waiting to run
Closes #38168

Signed-off-by: Alexander Schwartz <aschwart@redhat.com>
2025-03-19 21:34:09 +01:00
Alexander Schwartz
b5d8c46202
Fix links that have been moved
Closes #38190

Signed-off-by: Alexander Schwartz <aschwart@redhat.com>
2025-03-18 13:36:41 +01:00
Marek Posolda
290905c9cf
Documentation for supported token-exchange (#38008)
closes #37126

Signed-off-by: Marek Posolda <mposolda@gmail.com>


Co-authored-by: Bruno Oliveira da Silva <bruno@abstractj.com>
Co-authored-by: andymunro <48995441+andymunro@users.noreply.github.com>
2025-03-14 09:55:44 +01:00
Alexander Schwartz
151e019935
Make NetworkPolicy supported and enabled by default
Closes #36036

Signed-off-by: Alexander Schwartz <aschwart@redhat.com>
Signed-off-by: Alexander Schwartz <alexander.schwartz@gmx.net>
Co-authored-by: Pedro Ruivo <pruivo@users.noreply.github.com>
2025-03-10 11:12:38 +01:00
Alexander Schwartz
bc7ec1208e
Enable the TLS based JGroups encryption by default and update the docs
Closes #37696

Signed-off-by: Alexander Schwartz <aschwart@redhat.com>
2025-03-03 10:50:51 -03:00
Akbar Husain
9d3cfe0672
Remove X-XSS-Protection header (#36881)
Closes #21728

Signed-off-by: akbarhusainpatel <apatel@intermiles.com>
2025-02-19 08:42:26 +01:00
Michal Hajas
f54bb16a61
Add Grafana dashboards to release notes
Closes #37402

Signed-off-by: Michal Hajas <mhajas@redhat.com>
2025-02-18 14:04:23 +01:00
rmartinc
6850f41060 Force login in reset-credentials to federated users
Closes #37207

Signed-off-by: rmartinc <rmartinc@redhat.com>
2025-02-12 13:47:39 -03:00
Alexander Schwartz
822eb4471d
Ensure a sufficient virtual threads pool (#37197)
Closes #37162

Signed-off-by: Alexander Schwartz <aschwart@redhat.com>
2025-02-10 16:28:24 +01:00
Martin Bartoš
98f74026c6
Certificate reloading does not work for the management interface (#37052)
Fixes #37039

Signed-off-by: Martin Bartoš <mabartos@redhat.com>
Co-authored-by: Steven Hawkins <shawkins@redhat.com>
2025-02-05 14:39:21 +01:00
Pedro Igor
602df06191 Allows querying credential from user storage providers
Closes #35020

Signed-off-by: Pedro Igor <pigor.craveiro@gmail.com>
2025-02-05 07:56:05 -03:00
Martin Bartoš
20203746fb
Support ECS for logs
Closes #36854

Signed-off-by: Martin Bartoš <mabartos@redhat.com>
2025-02-04 17:59:30 +01:00
Ricardo Martin
8671f86046
Provide an option to force login after reset credentials (#36856)
Closes #36844

Signed-off-by: rmartinc <rmartinc@redhat.com>


Co-authored-by: Ricardo Martin <rmartinc@redhat.com>
Co-authored-by: andymunro <48995441+andymunro@users.noreply.github.com>
Co-authored-by: Marek Posolda <mposolda@gmail.com>
Signed-off-by: Marek Posolda <mposolda@gmail.com>
2025-01-28 18:35:02 +01:00
Giuseppe Graziano
bd807ceac3
Select auth flow via acr using client policies (#36441)
Closes #24297


Co-authored-by: Ben Cresitello-Dittmar <bcresitellodittmar@mitre.org>
Signed-off-by: Giuseppe Graziano <g.graziano94@gmail.com>
2025-01-23 19:46:07 +01:00
rmartinc
6cf92d9dc7 Add crl cache to certificate validation
Closes #26473

Signed-off-by: rmartinc <rmartinc@redhat.com>
2025-01-22 14:58:35 +01:00
rmartinc
f89be1813d Check next update time for CRL in certificate validation
Closes #35983

Signed-off-by: rmartinc <rmartinc@redhat.com>
2025-01-22 14:58:35 +01:00
Stian Thorgersen
fc2b9018f1
Extend REST API for login and admin events to support sync scenarios (#36601)
Closes #36600

Signed-off-by: stianst <stianst@gmail.com>
2025-01-20 14:32:55 +01:00
Alexander Schwartz
05e612bfb6
Moving the docs for password metrics to a new guide
Closes #36442

Signed-off-by: Alexander Schwartz <aschwart@redhat.com>
Signed-off-by: Alexander Schwartz <alexander.schwartz@gmx.net>
Co-authored-by: Michal Hajas <mhajas@redhat.com>
2025-01-14 16:17:04 +00:00
Stian Thorgersen
bc2665fc2a
Re-order items in release notes for 26.1 (#36346)
* Re-order items in release notes for 26.1

Signed-off-by: stianst <stianst@gmail.com>

* Review (#161)

Signed-off-by: Alexander Schwartz <aschwart@redhat.com>

---------

Signed-off-by: stianst <stianst@gmail.com>
Signed-off-by: Alexander Schwartz <aschwart@redhat.com>
Co-authored-by: Alexander Schwartz <alexander.schwartz@gmx.net>
2025-01-14 09:21:04 +00:00
Michal Hajas
3839f8e3b5
Add metric for password validations (#36049)
Closes #36048
Signed-off-by: Michal Hajas <mhajas@redhat.com>
Signed-off-by: Alexander Schwartz <aschwart@redhat.com>
Co-authored-by: Alexander Schwartz <aschwart@redhat.com>
2025-01-07 10:05:47 +01:00
Marek Posolda
4ab34f4816
Updating release notes with core-clients contributions and features (#36066)
closes #35953

Signed-off-by: mposolda <mposolda@gmail.com>


Co-authored-by: andymunro <48995441+andymunro@users.noreply.github.com>
Signed-off-by: Marek Posolda <mposolda@gmail.com>
2024-12-20 10:15:55 +01:00
Marek Posolda
a3fd076960
Adding ConditionalClientScopeAuthenticator (#36020)
closes #36081 

Signed-off-by: mposolda <mposolda@gmail.com>


Co-authored-by: andymunro <48995441+andymunro@users.noreply.github.com>
Signed-off-by: Marek Posolda <mposolda@gmail.com>
2024-12-20 09:53:51 +01:00
Jan Verhaeghe
56246096e0
Align on one realm-name placeholder
Closes #36047

Signed-off-by: Jan Verhaeghe <jan@hwfaq.be>
2024-12-19 13:48:18 +00:00
Pedro Ruivo
3767642f93
[Operator] Network Policy Rules
Closes #35598

Signed-off-by: Pedro Ruivo <pruivo@redhat.com>
2024-12-19 10:06:25 +01:00
Marek Posolda
47753b9624
Release note about node.js adapter and javascript adapter released in… (#35857)
closes #35856

Signed-off-by: mposolda <mposolda@gmail.com>


Co-authored-by: Jon Koops <jonkoops@gmail.com>
Signed-off-by: Marek Posolda <mposolda@gmail.com>

---------

Signed-off-by: mposolda <mposolda@gmail.com>
Signed-off-by: Marek Posolda <mposolda@gmail.com>
Co-authored-by: Jon Koops <jonkoops@gmail.com>
2024-12-13 09:38:55 +01:00
Martin Bartoš
41356dff24
Add Keycloak CR support for Tracing options (#35703)
Closes #32092

Signed-off-by: Martin Bartoš <mabartos@redhat.com>
2024-12-12 12:59:27 +01:00
Ricardo Martin
bbca6116b0
Implement a conditional authenticator to check if a sub-flow was executed or not previously in the process (#35668)
Closes #35231

Signed-off-by: rmartinc <rmartinc@redhat.com>


Co-authored-by: Marek Posolda <mposolda@gmail.com>
Co-authored-by: andymunro <48995441+andymunro@users.noreply.github.com>
2024-12-12 11:16:30 +01:00
Martin Bartoš
8f2c825835
Enable opentelemetry feature by default (#35756)
Closes #35753

Signed-off-by: Martin Bartoš <mabartos@redhat.com>
2024-12-11 16:53:14 +00:00
Václav Muzikář
9993e17346
Ability to specify log category levels through separate options (#35138)
Closes #34957

Co-authored-by: Steve Hawkins <shawkins@redhat.com>
Signed-off-by: Václav Muzikář <vmuzikar@redhat.com>
2024-12-11 17:27:44 +01:00
Alexander Schwartz
7c4a5aed77
Restructuring the migration guide (#35724)
Closes #35487

Signed-off-by: Alexander Schwartz <aschwart@redhat.com>
2024-12-10 12:07:32 +01:00
Stian Thorgersen
5bc4ab1429
Delete OpenShift 3.x identity provider (#34331)
Closes #34330

Signed-off-by: stianst <stianst@gmail.com>
2024-12-06 11:24:47 +01:00
Marek Posolda
d0cab170a3
Update release notes for Keycloak 26.1.0 with new community additions (#35590)
closes #35588

Signed-off-by: mposolda <mposolda@gmail.com>


Co-authored-by: andymunro <48995441+andymunro@users.noreply.github.com>
Signed-off-by: Marek Posolda <mposolda@gmail.com>
2024-12-04 18:51:15 +01:00
Martin Kanis
20770d8aaa Fix upgrading guide about deprecation of getAll() methods in the organization APIs
Closes #34975

Signed-off-by: Martin Kanis <mkanis@redhat.com>
2024-11-25 10:10:02 +01:00
Václav Muzikář
cf622e8d51
Update docs with security warning around client certificate lookup (#35222)
Closes #35217

Signed-off-by: Václav Muzikář <vmuzikar@redhat.com>
2024-11-22 10:12:21 +01:00
Martin Kanis
05116f7951 getAll() organization and organization members only returns the first 10 items
Closes #34975

Signed-off-by: Martin Kanis <mkanis@redhat.com>
2024-11-21 17:29:37 -03:00