Ce contenu n'est pas disponible dans la langue sélectionnée.
Release Notes
For Use with Red Hat Single Sign-On Continuous Delivery 7.3.0.cd02
Abstract
Chapter 1. Red Hat Single Sign-On Continuous Delivery 2 Copier lienLien copié sur presse-papiers!
1.1. Client Scopes and support for OAuth 2 scope parameter Copier lienLien copié sur presse-papiers!
We added support for Client Scopes, which replaces Client Templates. Client Scopes are a more flexible approach and also provides better support for the OAuth scope
parameter.
There are changes related to Client Scopes to the consent screen. The list on the consent screen is now linked to client scopes instead of protocol mappers and roles.
See the documentation and migration guide for more details.
1.2. OAuth 2 Certificate Bound Access Tokens Copier lienLien copié sur presse-papiers!
We now have a partial implementation of the specification OAuth 2.0 Mutual TLS Client Authentication and Certificate Bound Access Tokens . More accurately we have support for the Certificate Bound Access Tokens. If your confidential client is able to use 2-way SSL, Red Hat Single Sign-On will be able to add the hash of the client certificate into the tokens issued for the client. At this moment, it’s just the Red Hat Single Sign-On itself, which verifies the token hashes (for example during refresh token
requests). We plan to add support to adapters as well. We also plan to add support for Mutual TLS Client Authentication.
Thanks to tnorimat for the contribution.
Chapter 2. Red Hat Single Sign-On Continuous Delivery 1 Copier lienLien copié sur presse-papiers!
2.1. Authorization Services Copier lienLien copié sur presse-papiers!
2.1.1. UMA 2.0 Copier lienLien copié sur presse-papiers!
UMA 2.0 is now supported for Authorization Services, including support for users to manage user access through the account management console. There are also other additions and improvements to authorization services.
2.1.2. Pushed Claims Copier lienLien copié sur presse-papiers!
Clients can now push additional claims and have them used by policies when evaluating permissions.
2.1.3. Resource Attributes Copier lienLien copié sur presse-papiers!
It is now possible to define attributes on resources in order to have them used by policies when evaluating permissions.
2.2. Themes and Theme Resources Copier lienLien copié sur presse-papiers!
It is now possible to hot-deploy themes to Keycloak through a regular provider deployment. We have also added support for theme resources, which allows adding additional templates and resources without creating a theme. This is useful for custom authenticators that require additional pages to be added to the authentication flow.
We have also added support to override the theme for specific clients. If that is not adequate for your needs, then there is also a new Theme Selector SPI that allows you to implement custom logic to select the theme.
2.3. Instagram Identity Provider Copier lienLien copié sur presse-papiers!
We have added support to login with Instagram. Thanks to hguerrero for the contribution.
2.4. Search by User ID in Admin Console Copier lienLien copié sur presse-papiers!
To search for a user by id in the admin console you previously had to edit the URL. It is now possible to search directly in the user search field.
2.5. Adapters Copier lienLien copié sur presse-papiers!
2.5.1. Sprint Boot 2 Copier lienLien copié sur presse-papiers!
We now have support for Spring Boot 2.
2.5.2. Fuse 7 Copier lienLien copié sur presse-papiers!
We now have support for Fuse 7.
2.5.3. JavaScript - Native Promise Support Copier lienLien copié sur presse-papiers!
The JavaScript adapter now supports native promises. It retains support for the old style promises as well. Both can be used interchangeably.
2.5.4. JavaScript - Cordova Options Copier lienLien copié sur presse-papiers!
It is now possible to pass Cordova-specific options to login and other methods in the JavaScript adapter. Thanks to loorent for the contribution.