Keycloak 26.0.0 released
October 04 2024
To download the release go to Keycloak downloads.
Highlights
Organizations supported
Starting with Keycloak 26, the Organizations feature is fully supported.
Client libraries updates
Dedicated release cycle for the client libraries
From this release, some of the Keycloak client libraries will have release cycle independent of the Keycloak server release cycle. The 26.0.0 release may be the last one
when the client libraries are released together with the Keycloak server. But from now on, the client libraries may be released at a different time than the Keycloak server.
The client libraries are these artifacts:
-
Java admin client - Maven artifact org.keycloak:keycloak-admin-client
-
Java authorization client - Maven artifact org.keycloak:keycloak-authz-client
-
Java policy enforcer - Maven artifact org.keycloak:keycloak-policy-enforcer
It is possible that in the future, some more libraries will be included.
The client libraries are supported with Java 8, so it is possible to use them with the client applications deployed on the older application servers.
Compatibility of the client libraries with the server
Beginning with this release, we are testing and supporting client libraries with the same server version and a few previous major server versions.
For details about supported versions of client libraries with server versions, see the Upgrading Guide.
User sessions persisted by default
Keycloak 25 introduced the feature persistent-user-sessions
. With this feature enabled all user sessions are persisted in the database as opposed to the previous behavior where only offline sessions were persisted.
In Keycloak 26, this feature is enabled by default. This means that all user sessions are persisted in the database by default.
It is possible to revert this behavior to the previous state by disabling the feature. Follow the Volatile user sessions
section in Configuring distributed caches guide for more details.
New default login theme
There is now a new version (v2
) of the keycloak
login theme, which provides an improved look and feel, including support for switching automatically to a dark theme based on user preferences.
The previous version (v1
) is now deprecated, and will be removed in a future release.
For all new realms, keycloak.v2
will be the default login theme. Also, any existing realm that never explicitly set a login theme will be switched to keycloak.v2
.
Highly available multi-site deployments
Keycloak 26 introduces significant improvements to the recommended HA multi-site architecture, most notably:
-
Keycloak deployments are now able to handle user requests simultaneously in both sites.
-
Active monitoring of the connectivity between the sites is now required to update the replication between the sites in case of a failure.
-
The loadbalancer blueprint has been updated to use the AWS Global Accelerator as this avoids prolonged fail-over times caused by DNS caching by clients.
-
Persistent user sessions are now a requirement of the architecture. Consequently, user sessions will be kept
on Keycloak or Infinispan upgrades.
Admin Bootstrapping and Recovery
In the past, regaining access to a Keycloak instance when all admin users were locked out was a challenging and complex process. Recognizing these challenges and aiming to significantly enhance the user experience, Keycloak now offers several straightforward methods to bootstrap a temporary admin account and recover lost admin access.
It is now possible to run the start
or start-dev
commands with specific options to create a temporary admin account. Additionally, a new dedicated command has been introduced, which allows users to regain admin access without hassle.
OpenTelemetry Tracing preview
The underlying Quarkus support for OpenTelemetry Tracing has been exposed to Keycloak and allows obtaining application traces for better observability.
It helps to find performance bottlenecks, determine the cause of application failures, trace a request through the distributed system, and much more.
The support is in preview mode, and we would be happy to obtain any feedback.
OpenID for Verifiable Credential Issuance
The OpenID for Verifiable Credential Issuance (OID4VCI) is still an experimental feature in Keycloak, but it was greatly improved in this release. You will find significant development and discussions
in the Keycloak OAuth SIG. Anyone from the Keycloak community is welcome to join.
DPoP improvements
The DPoP (OAuth 2.0 Demonstrating Proof-of-Possession) preview feature has improvements. The DPoP is now supported for all grant types.
With previous releases, this feature was supported only for the authorization_code
grant type. Support also exists for the DPoP token type on the UserInfo endpoint.
Removal of GELF logging handler
GELF support has been deprecated for a while now, and with this release it has been finally removed from Keycloak.
Other log handlers are available and fully supported to be used as a replacement of GELF, for example Syslog. For details
see the Logging guide.
Lightweight access tokens for Admin REST API
Lightweight access tokens can now be used on the admin REST API. The security-admin-console
and admin-cli
clients are now using lightweight access tokens by default, so “Always Use Lightweight Access Token” and “Full Scope Allowed” are now enabled on these two clients. However, the behavior in the admin console should effectively remain the same. Be cautious if you have made changes to these two clients and if you are using them for other purposes.
Keycloak JavaScript adapter now standalone
Keycloak JavaScript adapter is now a standalone library and is therefore no longer served statically from the Keycloak server. The goal is to de-couple the library from the Keycloak server, so that it can be refactored independently, simplifying the code and making it easier to maintain in the future. Additionally, the library is now free of third-party dependencies, which makes it more lightweight and easier to use in different environments.
Hostname v1 feature removed
Automatic redirect from root to relative path
User is automatically redirected to the path where Keycloak is hosted when the http-relative-path
property is specified.
It means when the relative path is set to /auth
, and the user access localhost:8080/
, the page is redirected to localhost:8080/auth
.
The same applies to the management interface when the http-management-relative-path
or http-relative-path
property is specified.
It improves user experience as users no longer need to set the relative path to the URL explicitly.
Persisting revoked access tokens across restarts
In this release, revoked access tokens are written to the database and reloaded when the cluster is restarted by default when using the embedded caches.
Client Attribute condition in Client Policies
The condition based on the client-attribute was added into Client Policies. You can use condition to specify for the clients
with the specified client attribute having a specified value. It is possible to use either an AND or OR condition when evaluating this condition as mentioned in the documentation
for client policies.
Specify different log levels for log handlers
It is possible to specify log levels for all available log handlers, such as console
, file
, or syslog
.
The more fine-grained approach provides the ability to control logging over the whole application and be tailored to your needs.
Proxy option removed
The deprecated proxy
option was removed. This option was deprecated in Keycloak 24 and replaced by the proxy-headers
option in combination with hostname options as needed. For more details, see using a reverse proxy and the initial migration guide.
Option proxy-trusted-addresses
added
The proxy-trusted-addresses
can be used when the proxy-headers
option is set to specify a allowlist of trusted proxy addresses. If the proxy address for a given request is not trusted, then the respective proxy header values will not be used.
Option proxy-protocol-enabled
added
The proxy-protocol-enabled
option controls whether the server should use the HA PROXY protocol when serving requests from behind a proxy. When set to true, the remote address returned will be the one from the actual connecting client.
Option to reload trust and key material added
The https-certificates-reload-period
option can be set to define the reloading period of key store, trust store, and certificate files referenced by https-* options. Use -1 to disable reloading. Defaults to 1h (one hour).
The --cache-embedded-${CACHE_NAME}-max-count=
can be set to define an upper bound on the number of cache entries in the specified cache.
The https-trust-store-*
options have been undeprecated
Based on the community feedback, we decided to undeprecate https-trust-store-*
options to allow better granularity in trusted certificates.
The java-keystore
key provider supports more algorithms and vault secrets
The java-keystore
key provider, which allows loading a realm key from an external java keystore file, has been modified to manage all Keycloak algorithms. Besides, the keystore and key secrets, needed to retrieve the actual key from the store, can be configured using the vault. Therefore a Keycloak realm can externalize any key to the encrypted file without sensitive data stored in the database.
Adding support for ECDH-ES encryption key management algorithms
Now Keycloak allows configuring ECDH-ES, ECDH-ES+A128KW, ECDH-ES+A192KW or ECDH-ES+A256KW as the encryption key management algorithm for clients. The Key Agreement with Elliptic Curve Diffie-Hellman Ephemeral Static (ECDH-ES) specification introduces three new header parameters for the JWT: epk
, apu
and apv
. Currently Keycloak implementation only manages the compulsory epk
while the other two (which are optional) are never added to the header. For more information about those algorithms please refer to the JSON Web Algorithms (JWA).
Also, a new key provider, ecdh-generated
, is available to generate realm keys and support for ECDH algorithms is added into the Java KeyStore provider.
Support for multiple instances of a social broker in a realm
It is now possible to have multiple instances of the same social broker in a realm.
Most of the time a realm does not need multiple instances of the same social broker. But due to the introduction
of the organization
feature, it should be possible to link different instances of the same social broker
to different organizations.
When creating a social broker, you should now provide an Alias
and optionally a Display name
just like any other
broker.
New generalized event types for credentials
There are now generalized events for updating (UPDATE_CREDENTIAL
) and removing (REMOVE_CREDENTIAL
) a credential. The credential type is described in the credential_type
attribute of the events. The new event types are supported by the Email Event Listener.
The following event types are now deprecated and will be removed in a future version: UPDATE_PASSWORD
, UPDATE_PASSWORD_ERROR
, UPDATE_TOTP
, UPDATE_TOTP_ERROR
, REMOVE_TOTP
, REMOVE_TOTP_ERROR
The template.ftl
file in the base/login
and the keycloak.v2/login
theme now allows to customize the footer
of the login box. This can be used to show common links or include custom scripts at the end of the page.
The new footer.ftl
template provides a content
macro that is rendered at the bottom of the "login box".
Keycloak CR supports standard scheduling options
The Keycloak CR now exposes first class properties for controlling the scheduling of your Keycloak Pods.
KeycloakRealmImport CR supports placeholder replacement
The KeycloakRealmImport CR now exposes spec.placeholders
to create environment variables for placeholder replacement in the import.
Configuring the LDAP Connection Pool
In this release, the LDAP connection pool configuration relies solely on system properties.
Infinispan marshalling changes to Infinispan Protostream
Marshalling is the process of converting Java objects into bytes to send them across the network between Keycloak servers.
With Keycloak 26, we changed the marshalling format from JBoss Marshalling to Infinispan Protostream.
Warning
|
JBoss Marshalling and Infinispan Protostream are not compatible with each other and incorrect usage may lead to data loss.
Consequently, all caches are cleared when upgrading to this version.
|
Infinispan Protostream is based on Protocol Buffers (proto 3), which has the advantage of backwards/forwards compatibility.
Since all of the Java adapters that used OSGi metadata have been removed we have stopped generating OSGi metadata for our jars.
With the goal of improving the scalability of groups, they are now removed directly from the database when removing a realm.
As a consequence, group-related events like the GroupRemovedEvent
are no longer fired when removing a realm.
Identity Providers no longer available from the realm representation
As part of the improvements around the scalability of realms and organizations when they have many identity providers, the realm representation
no longer holds the list of identity providers. However, they are still available from the realm representation
when exporting a realm.
The Securing Applications and Services documentation was converted into the new format similar to the Server Installation and Configuration documentation converted in the previous releases.
The documentation is now available under Keycloak Guides.
Removal of legacy cookies
Keycloak no longer sends _LEGACY
cookies, which where introduced as a work-around to older browsers not supporting
the SameSite
flag on cookies.
The _LEGACY
cookies also served another purpose, which was to allow login from an insecure context. Although, this is
not recommended at all in production deployments of Keycloak, it is fairly frequent to access Keycloak over http
outside
of localhost
. As an alternative to the _LEGACY
cookies Keycloak now doesn’t set the secure
flag and sets SameSite=Lax
instead of SameSite=None
when it detects an insecure context is used.
Property origin
in the UserRepresentation
is deprecated
The origin
property in the UserRepresentation
is deprecated and planned to be removed in future releases.
Instead, prefer using the federationLink
property to obtain the provider to which a user is linked with.
Upgrading
Before upgrading refer to the migration guide for a complete list of changes.
All resolved issues
Deprecated features
- #600 De-couple quickstarts from statically served Keycloak JS quickstarts
New features
- #20342 Duplicate groups in the admin console of Keycloak admin/ui
- #26178 Support dark mode, at least for the login pages login/ui
- #29324 Bootstrapping an admin user using a dedicated command dist/quarkus
- #29755 Support AES and HMAC Key-Imports for the JavaKeystoreKeyProvider
- #30002 Bootstrapping an admin service account using a dedicated command dist/quarkus
- #30009 Warnings for temporary admin user and service account core
- #30011 Document admin bootstrapping and recovery docs
- #30682 Group assignment: Display disabled information from user admin/ui
- #30795 Initiate create events if ClientScopes are created
- #31421 Add Events for Organization Creation and Member Assignment organizations
- #31642 Include organization attributes and information in ID and access tokens organizations
- #31643 Implement invitation-only self-registration for realm users organizations
- #32030 Retry remote cache operations with back off
- #32135 Option to specify trusted proxies dist/quarkus
- #32553 Expose Password Policies in FreeMarker Context for Login Themes
Enhancements
- #583 Update dependency on keycloak-client in main branch to 999.0.0-SNAPSHOT quickstarts
- #10114 Specific events for webauthn register authentication/webauthn
- #10492 Support proxy_protocol
- #14073 SAML 2.0 HTTP-Artifact binding
- #15769 update or replace base64-js and js-sha256 adapter/javascript
- #16750 Google login - add prompt=select_account option core
- #19564 response_type none is oidc spec but ignored in the current implementation. oidc
- #19750 Use a proper FreeMarker template for the new consoles account/ui
- #21072 Make sure identity providers are not send in realm GET requests and PUT requests used in "Realm settings"
- #21261 Identity providers: Pagination in account console (and account REST API)
- #21342 Upgrade login theme to PatternFly 5 login/ui
- #23179 kcadm should have a command to verify connection admin/cli
- #23596 Support generated ECDH realm keys oidc
- #23597 Support ECDH-ES JWE algorithms oidc
- #23771 Automatically hot reload TLS certificates when https-certificate-file or https-certificate-key-file changes on disk dist/quarkus
- #24815 Hostname config check on welcome page
- #25391 Improve auto behavior with operator and --optimized
- #25541 Add an option for a custom welcome page to disable bootstrapping of admin account welcome/ui
- #26262 Remove need to update Quarkus tests when profile features change dist/quarkus
- #26470 Add a field to the RealmImportSpec to toggle replacing ENV variable placeholders
- #27040 [keycloak-js] Expose didInitialize as a public method/property adapter/javascript
- #27298 Validate spi options wrt build / run time dist/quarkus
- #27432 Document how to specify CPU and memory limits/requests for the Operator operator
- #27884 Automatic update of bcfips versions in the docs docs
- #27947 Rename Dockerfile to Containerfile in the docs docs
- #28017 Un-friendly error message for Fail Import option in keycloak GUI import-export
- #28140 External Infinispan as cache - Part 1
- #28311 Detect clients which refresh their access tokens too early
- #28581 Support OpenTelemetry tracing
- #28648 External Infinispan as cache - Part 2
- #28754 External Infinispan as cache - Part 3 / login failures cache
- #28755 External Infinispan as cache - Part 4 / user + client sessions online + offline
- #29200 Clarify import/export usage of options
- #29258 Support pod affinity settings in the Keycloak Operator operator
- #29303 Active/Active XSite fencing
- #29394 Infinispan Protostream
- #29480 GET users endpoint is making lots of requests to the database storage
- #29665 Please clarify in the docs that the replacement of KC_PROXY=edge is not just KC_PROXY_HEADERS, but one MUST set KC_HTTP_ENABLED=true.
- #29698 Improve SAML2 Metadata Validation Exception messages saml
- #29725 VC issuance in Authz Code flow with considering “scope” parameter oid4vc
- #29974 Add support of RTL UI in login pages login/ui
- #29986 private AuthzClient.createPatSupplier
- #30003 Bootstrapping an admin user or service account at server startup dist/quarkus
- #30004 Bootstrapping an admin user or service account using the Operator operator
- #30010 Update the welcome page to create a temporary admin user dist/quarkus
- #30094 Do not inherit 'https-client-auth' property for the management interface
- #30118 Admin UI - Fixed save buttons on the bottom at the page
- #30165 Handle proxy related env vars in the Operator operator
- #30243 Protobuf schema compatibility check (maven plugin)
- #30267 Protect the disabling of the main keycloak account admin/api
- #30286 Add missing translation for oid4vc protocol
- #30337 Introduce packages for organization tests organizations
- #30338 Refactor organization tests organizations
- #30346 Enhance masking around config-keystore dist/quarkus
- #30419 Credential Issuer Metadata: Support Optional ```claims``` Object in ```credential_configurations_supported``` in ```openid-credential-issuer``` endpoint oid4vc
- #30445 Batch cluster events
- #30454 Server crash when using kc.sh with -Dkeycloak.profile=experimental dist/quarkus
- #30525 Enhance Verifiable Credential Signing Service Flexibility and Key Rotation oid4vc
- #30537 Document how Admin REST API endpoints work with Hostname config docs
- #30542 Use correct scope within maven-plugin core
- #30623 Make sure not possible to import jakarta classes in admin-client-jee admin/client-java
- #30629 Cleanup dependencies of keycloak-client-registration-api to not have dependency on server admin/client-java
- #30707 prevent removing the flow when used by client flow overrides authentication
- #30743 Make sure users created through a registration link are managed members organizations
- #30746 Allow auto-redirect existing users federated from organization broker when using the username organizations
- #30747 Support for members joining multiple organizations organizations
- #30829 Print keycloak's server response when using keycloak-admin-client admin/client-js
- #30855 Make persistent user sessions and external Infinispan co-exist
- #30856 Remove inclusive language foreword docs
- #30873 Exchange VC Format class for String constantns oid4vc
- #30880 Add vault support to JavaKeystoreKeyProvider core
- #30907 Implement advanced verification of SD-JWT in Keycloak oid4vc
- #30918 VerifiableCredential: Exchange java.util.Date for java.time.Instant oid4vc
- #30924 Keycloak Operator should use the port name and not the port number for the ingress operator
- #30931 Enable ProtoStream encoding for External Infinispan feature
- #30934 Drop `AuthenticatedClientSessionStore` from user sessions
- #30995 Document LDAP connection pool configuration
- #30999 Make ProofType for CredentialRequest a string instead of enum oid4vc
- #31005 Override of begin transaction in AbstractKeycloakTransaction
- #31006 Conditionally redirect existing users to a broker based on their credentials organizations
- #31029 Refactor HA guide
- #31046 ConditionalRemove interface for External Infinispan feature
- #31056 Avoid iterating and updating all group policies when removing groups authorization-services
- #31064 Add simple cache to cache-local.xml
- #31076 Oauth2GrantType.Context requires getter-methods oidc
- #31086 Manipulate redirect on OpenID redirect with custom implementation oidc
- #31183 Show Display Name (if available) and Realm Id on Realm Dropdown Button admin/ui
- #31226 Release notes for JavaKeystoreProvider updates docs
- #31343 Can we remove distribution/feature-packs directory? adapter/jee
- #31388 [Organizations] Add a count() method to the OrganizationMembersResource core
- #31390 Allow custom login themes to define a footer ftl fragment login/ui
- #31438 Support for authenticating and issuing tokens in the context of a organization organizations
- #31489 Remove keycloak-undertow-adapter-spi adapter/saml
- #31491 Add a deprecation warning when old `KEYCLOAK_ADMIN`, `KEYCLOAK_ADMIN_PASSWORD` env vars are used dist/quarkus
- #31513 Support lightweight access tokens for Admin REST API oidc
- #31514 Allow Embedded Cache sizes to be configured via the CLI
- #31547 Use correct error code in error response in token exchange token-exchange
- #31548 Add issued_token_type to token-exchange response token-exchange
- #31581 Allow optional inclusion of Issue At TIme (iat) and Not Before (nbf) claim to a verifiable credential oid4vc
- #31625 import placeholders should be converted to an option
- #31648 Change default name of bootstrap service account dist/quarkus
- #31670 Make sure the storage provider ID is always available from `UserModel.getFederationLink`
- #31676 Upgrade to Quarkus 3.13.2 dist/quarkus
- #31681 Add x5c and jwk header to JWSBuilder oidc
- #31699 Optimize Remote Infinispan performance on removal of entry
- #31701 Optimize CPU cycles for persistent sessions
- #31725 Revoked tokens table is missing an index
- #31766 Client Policy - Condition : Client - Client Attribute oidc
- #31786 The console takes a very long time to display group members with LDAP provider ldap
- #31807 Simplify enabling MULTI_SITE setup in KC26
- #31816 Class CertificateUtils should support creation of EC certificates oidc
- #31845 JavaScript build should not cache Keycloak Java artifacts and should rotate PNPM cache
- #31876 Non clustered Keycloak with External Infinispan feature
- #31894 Redirect after cancelling a required action should contain kc_action parameter authentication
- #31908 Add docs for the OpenTelemetry tracing docs
- #31932 Upgrade to next Quarkus LTS dist/quarkus
- #31963 Upgrade to Infinispan 15.0.7.Final
- #32023 Add ECDH-ES encyption algorithms to the java keystore key provider core
- #32033 References to removed artifacts and obsolete properties in root pom.xml
- #32056 OTEL: Service name isn't configurable and doesn't comply with conventions
- #32095 OTEL: Dynamic service name for tracing in K8s environment operator
- #32131 Remove session related caches from external Infinispan in HA guide
- #32158 Add an endpoint to the `organizations` endpoint to return the organizations for a given user organizations
- #32188 Quarkus IDE Debugging should set JVM options like kc.sh
- #32198 error message "Address already in use" should state which address/port in particular
- #32231 OTEL: Profile Feature dist/quarkus
- #32265 Enable persistent sessions by default
- #32273 Optimize Persistent Sessions SQL for session list
- #32312 Relocate Quarkus resteasy-reactive dependencies to REST
- #32314 Syslog: add necessary options to cover the major usability dist/quarkus
- #32328 Upgrade to Infinispan 15.0.8
- #32343 Upgrade Keycloak's sizing guide for KC26 and persistent sessions
- #32387 Documentation for persistent sessions enabled by default
- #32388 Make update IdentityProvider admin REST API more efficient.
- #32389 Upgrade to Quarkus 3.13.3 dist/quarkus
- #32416 Skip creating sessions cache when Persistent Sessions is enabled
- #32428 Performance optimization when checking secure context
- #32517 Upgrade to Quarkus 3.14.2 dist/quarkus
- #32525 Document Syslog app-name option
- #32579 Set autocomplete="one-time-code" in OTP login form login/ui
- #32582 Remove tables `user_session`, `user_session_note` and `client_session`
- #32583 Review the number indexes for offline session tables
- #32586 Remove keycloak-core and keycloak-crypto-default from SAML galleon feature pack and upgrade them to Java 17 dependencies
- #32588 Search Identity Providers by alias or display name
- #32590 Remove `version()` projection from Ickle Queries
- #32596 Rename `remote-cache` Feature
- #32619 Possibility to separately specify log levels for log handlers
- #32683 Optimize LogoutEndpoint.backchannelLogout endpoint identity-brokering
- #32717 Make it explicit which options are needed when using optimized image with the Operator operator
- #32745 Review the RTO and RPO in the multi-site docs after the A/A failure and recovery tests
- #32746 Add organization id to the organization claim of the access token
- #32803 Update the HA guide with fencing lambda taking Infinispan caches offline
- #32804 Remove `org.keycloak.utils.ProxyClassLoader`
- #32845 Add client side password policy checks
- #32852 Prevent deadlocks on concurrent user updates
- #32863 Redirect to relative-path from the root path dist/quarkus
- #32906 Reduce the cost of updating user attributes in JPA store core
- #32968 [OID4VCI] Show OpenID4VCI Credential Issuer Metadata link in admin ui oid4vc
- #32970 Upgrade to Quarkus 3.14.4 dist/quarkus
- #33010 Bootstrap admin client should use lightweight access tokens dist/quarkus
- #33015 FolderThemeProvider should select theme from available themes core
- #33040 Provide more information when there is an error to possibly debug
- #33143 Add the Troubleshooting and Health checks guide to Keycloak
- #33163 Use INFO Log Level for status in Migration Logic in DefaultMigrationManager
- #33201 [Organizations] Allow orgs to define the redirect URI after user registers or accepts invitation link organizations
- #33203 Explicitly document that the Operator does not create an Ingress for Admin URL operator
- #33325 Refactor loading resources from themes
- #33384 Document supported configurations and limitations for multi-site
- #33405 Use feature versions for admin3, account3, and login2
- #33426 Minor tweaks in SAML documentation adapter/saml
- #33515 Use `crypto.randomUUID()` to generate UUIDs for Keycloak JS adapter/javascript
Bugs
- #555 Failures in `ExtendAdminConsoleTest` quickstarts
- #565 Build fails in the extension quickstarts
- #567 Tests in user-storage-simple quickstart are failing in main branch quickstarts
- #572 Action-token quickstarts don't compile with latest Keycloak quickstarts
- #574 Incorrect Keycloak version in the main branch of quickstarts quickstarts
- #595 Jakarta tests are failing with latest main quickstarts
- #607 Workflow failure - JavaScript quickstarts
- #10730 realm import: error if ldap groupmapper has a group path set import-export
- #13505 locale attribute not set after registration authentication
- #17857 New Admin UI does not send e-mails if account-client is disabled core
- #19070 authBaseUrl error on different hostname-admin-url, hostname-url admin/ui
- #20371 Double form submit in Admin UI possible leading to error mesages admin/ui
- #20431 Fine-grained admin permission client manage does not work admin/ui
- #23028 Documentation: Authorization Services documentation contains duplicated image authorization-services
- #23496 Rename "Realm name" field to "Realm ID" field in realm creation screen admin/ui
- #25234 front channel logout to clients are not called at Identity Proxy when using front channel logout to Identity Provider( oidc
- #25339 "Invalid Username" when "Email as Username" is used and the email contains special characters user-profile
- #25440 page-expired error page shown when using browser back-button on forgot-password page after invalid login attempt authentication
- #25794 Flaky test: org.keycloak.testsuite.model.DBLockTest#testTwoLocksCurrently storage
- #25837 Infinispan Cache(embedded) data is not being updated during mergeView event infinispan
- #26042 Issue when start-dev in 23.0.1 dist/quarkus
- #26117 Flaky test: org.keycloak.testsuite.oidc.AuthenticationMethodReferenceTest#testAmrPastMaxAge oidc
- #26176 Flaky test: org.keycloak.testsuite.forms.RecoveryAuthnCodesAuthenticatorTest#test03AuthenticateRecoveryAuthnCodes authentication
- #26435 NullPointerException when using client scope policy for token-exchange token-exchange
- #26794 MULTIVALUED_LIST_TYPE not working for client mappers admin/ui
- #27506 Readable realm name no longer visible in logs, but realm id is used instead core
- #27536 "User Profile" attributes not available for Users Attribute search and Attribute selection, if no view or manage realm realm-management role added account/ui
- #27677 Translations missing for user events in admin ui translations
- #27941 Entry 999.0.0 in MIGRATION_MODEL prevents future migrations of the database core
- #28020 Firefox Webauthn Registration "SecurityError: The operation is insecure." authentication/webauthn
- #28418 SSO Session Idle: session is still active after session idle time expired oidc
- #28489 Missing help text on tokens tab admin/ui
- #28633 Client roles won't open (Forbidden) with Fine Grained Permission (without view-clients realm-management role) account/ui
- #28643 Encountering `NullPointerException` - `KeycloakIdentity.getUserFromToken()` when running `admin-ui` locally admin/ui
- #28865 NullPointerException on RealmCacheSession when upgrading Keycloak 23.0.4 to 24.0.2 infinispan
- #28953 Flaky test: org.keycloak.testsuite.actions.RequiredActionUpdateProfileTest#updateProfileWithoutRemoveCustomAttributes ci
- #29098 User profile validation pattern error-message not rendered from messages_en.properties admin/ui
- #29211 Network error attempting to view default realm roles without permissions admin/ui
- #29271 TrustedHostClientRegistrationPolicyTest#testGithubDomain failing in clean checkout testsuite
- #29385 Restart authentication event type is not generated authentication
- #29407 Need refresh attributes group translations on Users > Details tab admin/ui
- #29413 Realm client unset protocol not preserved admin/ui
- #29468 realm_settings_general_tab_test.spec fails randomly admin/ui
- #29486 Default theme logs font related console errors on firefox login/ui
- #29542 The EmailEventListenerProvider throws an exception on brute force lockout events authentication
- #29566 User Profile attributes/groups in Admin UI are not translated using Localization for non-master realm when signed in the master realm account/ui
- #29615 Get effective roles for user needs more privileges than expected admin/api
- #29761 bug: disabling all default features no longer works core
- #29784 Exception while trying to run a LDAP sync with a group importer and a batch size less then the actual number of groups ldap
- #29866 Missing Cache-Control header when "response_type" parameter is missing in login request authentication
- #29878 Updating a client protocol mappers through Admi CLI (kcadm) resets the client service account roles admin/cli
- #29978 Admin UI slow performance loading 600+ realms admin/ui
- #30048 Save button is not activated at first modification on "Client scope details" admin/ui
- #30111 Flaky test: org.keycloak.testsuite.oauth.TokenIntrospectionTest#testUnsupportedToken ci
- #30115 Admin v2 theme - theme.properties Custom theme scripts not loading admin/ui
- #30143 User in subgroup not synchronized and still appears as not in the subgroup account/ui
- #30181 [DPoP] token_type on UserInfoEndpoint expects Bearer instead of DPoP oidc
- #30188 Flaky test: org.keycloak.testsuite.broker.KcOidcBrokerTest#testPostBrokerLoginFlowWithOTP_bruteForceEnabled ci
- #30201 Keycloak CI - failure in Store IT (aurora-postgres) ci
- #30235 Flaky test: org.keycloak.testsuite.model.user.UserModelTest#testAddRemoveUserConcurrent ci
- #30236 Flaky test: org.keycloak.testsuite.model.user.UserModelTest#testAddRemoveUserConcurrent ci
- #30240 Custom attributes are removed during UPDATE PROFILE event core
- #30271 Client role descriptions are not localized admin/ui
- #30276 The "Quarkus development mode" instructions in quarkus/README.md throw a ForkJoinPool error dist/quarkus
- #30284 Executor consent-required does not work for client-roles condition oidc
- #30300 Upgrade to Keycloak 25 - Table 'USER_CONSENT' is specified twice on MySQL/MariaDB database core
- #30302 Methods of SimpleHttp are after change now too much protected core
- #30305 Importing organizations failing if there is no broker and members in the representation organizations
- #30306 Upgrade to Keycloak 25 - Events bug in UI admin/ui
- #30308 Organization resources in keycloak-admin-client-jee have dependencies on jakarta admin/client-java
- #30312 Add an alias to organization organizations
- #30313 Expose organization to theme templates organizations
- #30329 Client secret rotation UI shows wrong rotated secret admin/ui
- #30332 Operator fails to patch ingress after update to 25.0.0 operator
- #30334 RESTART_AUTHENTICATION_ERROR when login in in private browser window after 25.0.0 update core
- #30335 Google login on Social login test is failing ci
- #30339 Identity-first login flow should be followed by asking for the user credentials rather than allowing providing the username again organizations
- #30351 Migration of sessions in KC25 should run only on migration, not on imports
- #30355 New operator failing on health checks operator
- #30368 Documentation : label error for persistent-user-sessions feature flag docs
- #30380 Incorrect warning log about deprecated options hostname, hostname-debug dist/quarkus
- #30383 Account Console (v3) no longer highlights the current page in the nav bar account/ui
- #30414 Login / Admin events filter by date under realm Events return incorrect results storage
- #30417 Keycloak 25 db guide shows unevaluated "ifeval docs
- #30425 Built-in scopes are not translated in the account console "applications" tab account/ui
- #30432 keycloak hostname:v2 /admin used on "hostname" instead of "hostname-admin" admin/ui
- #30434 Improvements for ldap test authentication ldap
- #30436 Client Roles are not shown when clientId property is set admin/ui
- #30440 UI theme bug in KC 25.0.0 admin/ui
- #30449 Migration stuck if versions incompatible operator
- #30460 The `start` command should automatically re-build when previous run was `start-dev` dist/quarkus
- #30476 All user attributes readonly in admin ui and admin API after setting edit mode of one user federation to READ_ONLY core
- #30485 Fix LoginFailureEntity protostream encoding infinispan
- #30492 partial_import_test fails randomly admin/ui
- #30511 Fix AuthenticatedClientSessionEntity protostream encoding infinispan
- #30520 Flow steps back when changing locale or refreshing page on "Try another way page" authentication
- #30521 "Client Offline Session Max" no longer available admin/ui
- #30541 Account UI resources try to load from admin path instead of frontend path account/ui
- #30550 [UI] group selection does not update attribute tab admin/ui
- #30552 After migrating from 24 to 25, the signature algorithms names do not display in drop down menu admin/ui
- #30582 Localization prevents update of user-profile attributes admin/ui
- #30591 Invalid character in spanish translation file for Identity Provider Link Template translations
- #30599 client-jwt authentication fails on Token Introspection Endpoint oidc
- #30604 Network response was not OK. saml
- #30614 token exchange: exchange-sequence fails with Client session for client 'client-exchanger' not present in user session token-exchange
- #30641 Flaky test: org.keycloak.testsuite.broker.KcSamlBrokerTest#testPostBrokerLoginFlowWithOTP_bruteForceEnabled ci
- #30652 Default server port is used instead of the management interface port in the guide about running Keycloak in a container
- #30662 User policy -> select user shows user id instead of user name. admin/ui
- #30663 A theme called `custom` is displayed as `Custom Attribute...` in the admin console admin/ui
- #30677 LDAP connection pool params(maxsize, initsize, prefsize) picked up from backend ComponentModel and are not visible in Keycloak admin console ldap
- #30678 Require SSL mode "External requests" does not work with IPv6 local addresses dist/quarkus
- #30683 Infinite loader on the admin console for non-admin users admin/ui
- #30703 Recovery codes missing from account console docs
- #30705 Full details of errors not shown in admin and account console account/ui
- #30706 Internal error occurs for the removed flow which override by the client authentication
- #30712 Remove of Multivalued Attribute due to - Adding translations when a new attribute is created admin/ui
- #30717 Broken external links docs
- #30730 Cannot explicitly disable KERBEROS feature core
- #30758 Docs: server_admin/topics/login-settings/acr-to-loa-mapping.adoc docs
- #30761 Protobuf deserialization has a default of an empty String core
- #30765 fallback to the no override flow when the flow is missing in client override authentication
- #30772 Rendering of granted client scopes in User Consents view broken in Admin UI admin/ui
- #30794 Filtering by Client ID in the "User Client Role" mapper does not work anymore admin/ui
- #30816 Docs: server_development/topics/themes.adoc docs
- #30821 Testing connection to ldap on the settings page does not work in 25.0.1 ldap
- #30837 Cannot find requested client with clientId ldap
- #30840 Incorrect order when instantiate ClientRemovedEvent infinispan
- #30857 Check for being Offline type in refresh token flow must be done based on refresh token request parameter oidc
- #30866 admin-cli invalid credentials admin/cli
- #30874 DPoP Keycloak JS Adapter docs
- #30917 reCAPTCHA Enterprise v3 - Unrecognized field "accountDefenderAssessment" core
- #30935 Incorrect version comparison in ModelVersion storage
- #30941 Fix docs about User Storage SPI JPA quickstart docs
- #30945 Keycloak operator adds proxy by default which is depreacted operator
- #30947 Error when trying to edit authentication sub-flow name / description admin/ui
- #30967 Keycloak is not working in IBM AIX OS. dist/quarkus
- #30969 Brute force protection: Lockout permanently uses parameters configured under lockout temporarily core
- #30992 Realm cannot be deleted if there are tons of consents storage
- #31001 User Federation settings changing when saving admin/ui
- #31014 "Verify Email" may cause other Required Actions to be ignored authentication
- #31021 Styling of recovery codes seems wrong login/ui
- #31023 Keycloak 25 - protocol_mapper_config stores client_uid in usermodel.clientRoleMapping.clientId instead of client_id admin/ui
- #31038 Home URL for account-console / security-admin-console broken in admin-ui admin/ui
- #31040 Cannot reorder custom auth flow executions in admin-ui admin/ui
- #31045 Users cache clears after creating client scope. infinispan
- #31050 Caching docs should name parameter runtime parameters, not build parameters docs
- #31062 Updating dynamically registered client's metadata drops `preferred_username` from ID token core
- #31070 Search doesn't work for nested groups admin/ui
- #31083 Docs: server_admin/topics/admin-console-permissions/fine-grain.adoc authorization-services
- #31085 MULTIVALUED_STRING_TYPE not displaying 1 value while more than 1 value is working fine admin/ui
- #31107 Not able to remove otp credential of user account/api
- #31111 inputOptionLabelsI18nPrefix is take into consideration only for login-ui account/ui
- #31115 Review filtering of session returned from the sessions cache core
- #31143 KC.ORG user attribute shown - even if the organizations feature for the realm is disabled admin/ui
- #31144 "Can not update organization group" error when trying to create organisation from REST API organizations
- #31153 Cannot set unmanagedAttributePolicy without profile attributes admin/api
- #31161 Keycloak 25: Only first required action is executed core
- #31165 Re-enabling a temporarily locked user (brute-force) deletes all user properties and attributes admin/ui
- #31166 A lot (really!) dropdown/select fields in admin-ui remain open after selecting an action/entry. admin/ui
- #31167 After creating a new authentication flow and returning to the list, the "Used by" column displays "flow.undefined" admin/ui
- #31169 Wrong Sync Mode of newly created external IdentityProvider admin/api
- #31171 Single use tokens, like action tokens, has a claim `expiration` core
- #31182 Realm export - duplicated elements in browser flow. Organization user must click login button multiple times. import-export
- #31187 Recaptcha links changed in the Google Docs docs
- #31196 The check for userdn in test ldap should consider that AD proxy user can be in non DN format ldap
- #31204 Bruteforce protector does not work when using organizations organizations
- #31216 #kc-form-options div not wrapping its content correctly in login-password.ftl login/ui
- #31218 Clarify if JGroups thread metrics can be shown with embedded Infinispan
- #31219 [Docs] Broken link in Server Admin guide for JWT_Auth wiki docs
- #31224 Offline tokens created in Keycloak 9 will not work on Keycloak 25 oidc
- #31228 Userprofile/Translation: user attribute cannot be saved because no translation was (even though it is present) admin/ui
- #31240 Can't update the user where userName contains uppercase letters core
- #31244 IdP redirect URL shows hostname_admin admin/ui
- #31246 All pubic brokers are shown during authentication rather than only those associated with the current organization organizations
- #31260 Download of Recovery Codes broken. File contains no Recovery Codes. login/ui
- #31267 multiple ldap url's not working on one realm ldap
- #31276 Account console won't load when using URL having a path as hostname config account/ui
- #31291 Incosistent casing of built-in flow descriptions core
- #31296 Revoke access tokens for persistent user sessions storage
- #31304 Hide save / update buttons in account console for READ_ONLY federated accounts account/ui
- #31319 keycloak.v2 broken in main login/ui
- #31341 Keycloak URL for Brokerage in Admin UI still suggests "/realms" in the path admin/ui
- #31368 logging-pattern failure in token-exchange token-exchange
- #31386 Joining group for user doesn't list correct number of groups admin/ui
- #31410 call to group-by-path does not return subGroupCount admin/api
- #31413 Wrong command in exposing metrics from caches section docs
- #31420 Seeing `Client cannot marshall the server's key media type` with external Infinispan after 25 upgrade infinispan
- #31444 keycloak Public Client secret are updated frequently admin/api
- #31466 Duplicate Key "validatingX509CertsHelp" in admin-ui messages admin/ui
- #31480 dynamic MultiValuedListComponent default value not stringified admin/ui
- #31515 Export users throws Disabled option: '--users' in v25 import-export
- #31519 Admin API extremely slow with service account and fine-grained authorization `view-users` admin/fine-grained-permissions
- #31537 Creating client roles with fine grained permissions is not possible admin/fine-grained-permissions
- #31545 Event tables have broken aria-labels admin/ui
- #31558 MSSQL test container can't start ci
- #31563 Link existing account to SSO by email not linking since v23 login/ui
- #31575 AdvancedClaimToGroupMapper throws Exception if no claims are configured identity-brokering
- #31585 Credential offer endpoint fails with 500 when bearer token has expired oid4vc
- #31592 Description field for roles creation could be better instead of ${} values admin/ui
- #31595 Misconfiguration of login settings causes login to not be possible admin/api
- #31598 CURL commands in build don't check the response code ci
- #31603 Can't delete kerberos user storage
- #31612 Store Model Tests (jpa+cross-dc-infinispan+persistentsessions) - org.keycloak.testsuite.model.session.SessionTimeoutsTest infinispan
- #31614 Endpoint /admin/users Degradation Based on Role admin/fine-grained-permissions
- #31633 localization not work with user attribute display name in users add admin/ui
- #31640 Admin Console Spins with hostname:v2 using security-admin-console Redirect URIs docs
- #31687 "Use metadata descriptor URL" switch is always set to "On" admin/ui
- #31704 ID is used as tab name instead of localized string admin/ui
- #31712 The OID4VCI cross-device flow should not require the device to have an access token oid4vc
- #31718 Documentation for `Delete Credential` action and related changes authentication
- #31760 Persist revoke tokens with remote cache feature storage
- #31780 SAML IdP configure does not parse IdP metadata.xml correctly saml
- #31781 Keycloak 25 SAML IdP has made Single Logout URL mandatory. saml
- #31818 Management Interface is turned on even though nothing is exposed on it dist/quarkus
- #31823 Ignoring JWK key Missing required field 'use' still happens in keycloak version 25.02 identity-brokering
- #31828 EmbeddedInfinispanSplitBrainTest fails with "IllegalState Session not bound to a realm" core
- #31829 Deleted authentication sessions should not be re-surrected with an update core
- #31858 Custom component persist only some config keys admin/api
- #31864 Certificate-Generation with EC signing RSA and vice versa does not work oidc
- #31881 Flaky test: org.keycloak.testsuite.forms.BruteForceTest#testRaceAttackPermanentLockout ci
- #31882 Realm roles that do not exist are displayed in "Default roles" when "Hide inherited roles" is not checked admin/ui
- #31892 Client secret is visable in Admin event representation when Credentials Reset action performed for the Client. admin/api
- #31893 In realm role ellipsis value is null admin/ui
- #31918 Network error attempting to view events without permissions admin/ui
- #31929 Network error attempting to view user registeration without permissions admin/ui
- #31931 Failure to generate Ed448 token authentication
- #31941 Cache guide does not properly print `cache-stack` values docs
- #31944 Filter organization brokers in the account console organizations
- #31947 Fix server guide cross-references for downstream docs docs
- #31956 Admin console not usable when instance has a 1000 realms admin/ui
- #31972 Unstable test ExternalInfinispanTest testsuite
- #32016 `My password` string in `Signing in` page not getting translated in `keycloak.v3 account` theme account/ui
- #32025 Not possible to import realm with newest Java admin-client against Keycloak 24 admin/client-java
- #32059 Look around window cannot be set to 0 admin/ui
- #32084 SAML adapter IdMapperUpdaterSessionListener not executed when session ID changes adapter/saml
- #32100 Remember Me with External Infinispan is not works properly infinispan
- #32108 [Scalability of IDPs] Follow up: ensure organization aware IdentityProviderModel is used in the infinispan IDPProvider
- #32117 Impossible to import RolePolicy with newest admin-client against Keycloak 24 admin/client-java
- #32127 Offline session bug on 25.0.2 core
- #32136 Missing TypeScript `populateHierarchy` param for keycloak admin client admin/client-js
- #32150 Session list doesn't handle non-existing client gracefully core
- #32153 Remote Infinispan code must not call JPA code in non-blocking thread core
- #32156 SingleSelect-kind readonly attribute is not disabled in account console account/ui
- #32176 Bootstrap options missing from help dist/quarkus
- #32178 Table names for persistent sessions upgrading guide is wrong docs
- #32180 Session list not appearing: SQL Error "The incoming request has too many parameters"
- #32182 `show-config` command outputs duplicate options dist/quarkus
- #32194 UserRemovedEvent does not contain all user attributes infinispan
- #32195 Migration to persistent sessions fails from Keycloak version <22 storage
- #32197 Keycloak reuses AUTH_SESSION_ID of logged out sessions login/ui
- #32205 Endpoint configurations shows hostname_admin admin/ui
- #32238 Brokers associated with organization not filtered when linking brokers with an organization organizations
- #32256 Flaky test: org.keycloak.testsuite.forms.BruteForceTest#testRaceAttackPermanentLockout ci
- #32259 [Keycloak CI] - AuroraDB IT fails to start on EC2 due to lack of entropy regression storage
- #32305 Temporary admin account notice logged to org.keycloak.events dist/quarkus
- #32333 Legacy `KEYCLOAK_ADMIN` environment variable is not working dist/quarkus
- #32368 KeycloakRealmImport not working with Istio service mesh operator
- #32392 Validate organization alias for forbidden chars organizations
- #32402 Additional datasources do not work dist/quarkus
- #32415 Missing translations for required action webauthn-register login/ui
- #32419 Joining group with text filter does not show all results even if backend returned them admin/ui
- #32425 Duplicate message keys in admin messages_en.properties admin/ui
- #32435 Multiple Logout Confirmation Actions Trigger NullPointerExceptions core
- #32451 Wildcard search not working for custom user attributes admin/api
- #32460 When Organization feature is enabled UserAdapter.getGroupsCount() returns wrong result organizations
- #32465 SocialLoginTest failing after switching to the new IDP Provider
- #32468 Warning Banner for Temporary Admin User shouldn't be placed under breadcrumbs admin/ui
- #32473 Flaky test: org.keycloak.testsuite.webauthn.WebAuthnIdlessTest#testWebAuthnIDLessAndWebAuthnAndWebAuthnPasswordlessLogin ci
- #32477 Flaky test: org.keycloak.testsuite.forms.ResetPasswordTest#resetPasswordWrongSmtp ci
- #32478 Flaky test: org.keycloak.testsuite.forms.ResetPasswordTest#resetPasswordWithPasswordHistoryPolicy ci
- #32481 Drag & drop issue with the step order in the Authentication settings of the Admin Console admin/ui
- #32486 Identity Provider secret visible in Organization tab (API request) organizations
- #32492 Welcome screen logo is bigger then the one on login welcome/ui
- #32498 Flaky test BruteForceTest.testPermanentLockout() core
- #32503 Flaky test: org.keycloak.testsuite.webauthn.WebAuthnTransportsTest#internalTransport ci
- #32510 Login v2 username form login/ui
- #32512 [Keycloak CI] - BruteForceTest.testPermanentLockout failures login/ui
- #32513 [Keycloak CI] - OrganizationBruteForceTest.testPermanentLockout failures login/ui
- #32514 [Keycloak CI] - ResetPasswordTest.resetPasswordExpiredCode failures login/ui
- #32515 Invalid client data in /login-actions/authenticate causes an uncaught server error and a HTTP 500 response code authentication
- #32531 Cannot invoke "org.keycloak.authentication.RequiredActionFactory.isConfigurable()" because "factory" is null account/ui
- #32533 Admin UI messages sometimes miss details, and sometimes refer to details in the logs which are missing admin/ui
- #32541 Flaky test: org.keycloak.testsuite.forms.ResetPasswordTest#resetPasswordLinkNewTabAndProperRedirectClient ci
- #32542 Flaky test: org.keycloak.testsuite.forms.ResetPasswordTest#resetPasswordLinkNewBrowserSessionPreserveClient ci
- #32544 Multiple bugs in the experimental UiTabProvider / UiTabProviderFactory admin/ui
- #32546 "Include Client Audience" field is not mandatory admin/ui
- #32547 The set value ‘Default Admin-Initiated Action Lifespan’ has no effect on the ‘Credential Reset’ form admin/ui
- #32548 Flaky test: org.keycloak.testsuite.webauthn.registration.UserVerificationRegisterTest#required ci
- #32554 CRDs for the Operator are generated multiple times during the build operator
- #32605 Flaky test: org.keycloak.testsuite.webauthn.WebAuthnTransportsTest#nfcTransport ci
- #32606 Flaky test: org.keycloak.testsuite.webauthn.WebAuthnTransportsTest#bluetoothTransport ci
- #32609 Continuous loading screen instead of access denied on account info page account/ui
- #32615 Forms IT (chrome) ResetOtpTest fail testsuite
- #32622 InvalidDestination Error for IDP-initiated SSO with Keycloak behind a Reverse Proxy saml
- #32623 OAuth login error with custom scheme oidc
- #32624 "Authentication" Link in Admin Portal Fails with 400 Bad Request After Migrating to Version 25 admin/ui
- #32641 Help text under text field admin/ui
- #32643 Dots are not allowed in the path in Hostname v2 dist/quarkus
- #32678 Flaky test: org.keycloak.testsuite.forms.ResetPasswordTest#resetPasswordBeforeUserIsDisabled ci
- #32689 Unable to import master realm with --import-realm dist/quarkus
- #32698 On backchannel logout, a user ID with a dot on the broker side breaks the logout by user core
- #32731 KeyCloak Admin Client uses non-standard `@NoCache` annotation which is an issue for Quarkus admin/client-java
- #32736 In the account console when I update the password the referrer dissapears account/ui
- #32755 Leftover code in login-passkeys-conditional-authenticate.ftl login/ui
- #32758 Keycloak admin console interface is out of screen admin/ui
- #32761 The endpoint /admin/realms/{{realm}}/groups/{{group-id}}/members potentially fetch all user in database admin/api
- #32764 When forcing re-authentication by passing maxAge value as 0 does not work adapter/javascript
- #32770 Adapters backward compatibility tests are failing ci
- #32782 `@noble/hashes/sha256` is bundled into Keycloak JS adapter/javascript
- #32784 Flaky test: org.keycloak.testsuite.url.HostnameV2Test ci
- #32789 CVE-2024-7318 - Use of a Key Past its Expiration Date in org.keycloak:keycloak-core
- #32798 Custom theme and not existing image: error 500 (No enum constant org.keycloak.theme.Theme.Type.IMG) login/ui
- #32799 Realm import fails when client configures default_acr values import-export
- #32802 Lightweight access token is not working for bootstrap admin client oidc
- #32817 Error when deploying SAML application with the keys in PEM format inside keycloak-saml.xml adapter/saml
- #32829 Login V2 theme: Pages specify fewer tabindex entries login/ui
- #32830 Login v2 theme: Auto-focus on input fields no longer working and autocomplete changed login/ui
- #32833 TOTP QR codes broken when realm display name contains colon character core
- #32834 Admin UI does not display admin events expiration admin/ui
- #32860 Database index creation isn’t skipped on large data sets in Keycloak 24 storage
- #32870 Increased DB activity due to changes in LDAPStorageManager.searchForUserByUserAttributeStream ldap
- #32880 Flaky test: org.keycloak.testsuite.forms.RegisterTest#registerExistingEmailAllowed ci
- #32881 Flaky test: org.keycloak.testsuite.forms.RegisterTest#registerUserNotContainsUsernamePasswordPolicy ci
- #32891 Exceptions on X509 authentication are logged without a stack trace core
- #32892 [Store Model Test] Failed test org.keycloak.testsuite.model.session.UserSessionPersisterProviderTest#testOnRealmRemoved ci
- #32896 Inconsistency of the access token iat after setting the time offset in the test suite authentication
- #32915 Administrator username changed in master realm after configuring email address for SMTP connection test for another realm with "Email as username" enabled admin/ui
- #32916 Device activity client name translations account/ui
- #32923 Flaky test: org.keycloak.testsuite.webauthn.WebAuthnTransportsTest#usbTransport ci
- #32930 Flaky test: org.keycloak.testsuite.forms.RegisterWithUserProfileTest#testAttributeInputTypes ci
- #32939 Flaky test: org.keycloak.testsuite.webauthn.WebAuthnIdlessTest#testWebAuthnIDLessWithNonResidentCredentialLogin ci
- #32942 Flaky test: org.keycloak.testsuite.broker.KcOidcBrokerTest#testPostBrokerLoginFlowWithOTP_bruteForceEnabled ci
- #32984 Application names are not taking realm overrides into account account/ui
- #33011 Admin bootstrap client should not have standard flow enabled dist/quarkus
- #33023 Documentation CI is failing on broken links docs
- #33037 Flaky test: org.keycloak.testsuite.webauthn.registration.UserVerificationRegisterTest#discouraged ci
- #33044 Next page not working for "Localization --> Realm overrides" admin/ui
- #33054 Identity-first login screen has broken IDP icons admin/ui
- #33058 Clusterless feature is not tested in Model tests testsuite
- #33060 Tests are showing exception while trying to import admin user after organizations were enabled by default testsuite
- #33064 Action expired error occurs when accessing regular registration page with Organizations enabled organizations
- #33095 The "Valid redirect URIs" field is not displayed when the "Standard flow" is unchecked admin/ui
- #33109 Infinite loop when accessing account management console account/ui
- #33115 CVE-2024-8883 Vulnerable Redirect URI Validation Results in Open Redirect
- #33116 CVE-2024-8698 Improper Verification of SAML Responses Leading to Privilege Escalation in Keycloak
- #33156 CVE-2024-7254 - Stack-based Buffer Overflow in com.google.protobuf:protobuf-java dist/quarkus
- #33172 Deprecation of https-trust-store-* weakens X509 browser authentication authentication
- #33207 [Organizations] Preserve org id in exported realms core
- #33224 [Keycloak CI] - Quarkus IT - StartCommandDistTest.testStartUsingAutoBuild ci
- #33231 [Keycloak CI] - User Federation Tests - LDAPSamlIdPInitiatedVaryingLetterCaseTest ci
- #33246 Unable to start Keycloak when metrics are enabled dist/quarkus
- #33296 Migrating to a FIPS environment disallows all users from logging in authentication
- #33300 Organization UI is overriding the alias with the org name when user navigates to another tab admin/ui
- #33307 XA Transaction recovery support is enabled even thoug transaction-xa-enabled is false dist/quarkus
- #33330 "somethingWentWrong" when opening Keycloak URL in unsecure context login/ui
- #33331 Performance drop in cpuUsageForLoginsTest since 19.09.2024
- #33336 Changing locale on passwordless or custom login flow does not work login/ui
- #33342 Duplicate entry "duplicate" in Admin UI message properties admin/ui
- #33347 Hostname v2 should enforce hostname is a full url if hostname-admin is used dist/quarkus
- #33351 Wrong release notes for Login v1 theme deprecation login/ui
- #33353 Performance regression when Organisations feature is enabled
- #33355 ID token from refresh_token flow does not contain nonce even when using Nonce backwards compatible mapper oidc
- #33362 Flaky test: org.keycloak.testsuite.webauthn.registration.UserVerificationRegisterTest#preferredVerificationWrong ci
- #33389 Banner is not wrapping properly admin/ui
- #33390 Creating clientAttributesCondition in some client policy breaks the login to the realm authentication
- #33412 User specific organisation entries shouldn't be placed in the realm cache core
- #33415 Organization brokers should be hidden on login pages by default organizations
- #33424 Organization data is cached for each user even if realm never enabled organizations organizations
- #33439 Avoid caching `RealmModel` in `CachedOrganization` organizations
- #33440 Test group_test.spec.ts Duplicate group fails repeatedly testsuite
- #33461 AWS Lambda description for HA setup doesn't reflect latest changes for failure policy core
- #33467 The "Client Secret" field does not expand to display the entire secret value admin/ui
- #33508 Can't load theme resources on Windows core
- #33517 Issue when running tests from IDE on embedded undertow ( org.jboss.threads.EnhancedQueueExecutor$Builder.setKeepAliveTime(java.time.Duration) ) testsuite