Questo contenuto non è disponibile nella lingua selezionata.
Chapter 5. Deprecated features
The following sections provide details on deprecated features.
5.1. SPI options separating the provider with a single dash Copia collegamentoCollegamento copiato negli appunti!
SPI options ending in -enabled, -provider-default, or -provider are treated as build-time options. However, in some instances, this was not correct as a provider could have a configuration property ending in one of those suffixes as well.
To resolve this ambiguity, and any potential ambiguity involving SPI and provider names, a new SPI option format was introduced where the scopes and suffix are separated by --(double dash) instead of -(dash). The new format then reads as spi-<spi-name>--<provider-name>--....
An SPI property ending in -enabled, -provider-default, or -provider should use the new format or else a warning will be emitted. For example spi-<spi-name>--<provider-name>--enabled will be recognized as a build-time option without a warning.
For instance, the correct way to reference your custom email template is: --spi-email-template--mycustomprovider--enabled (not --spi-email-template-mycustomprovider-enabled).
Options using the legacy format and ending in -enabled, -provider-default, or -provider will still be treated as a build-time option, but may not be in future releases.
5.2. Kubernetes cache stack Copia collegamentoCollegamento copiato negli appunti!
The kubernetes cache stack has been deprecated and will be removed in a future release. Users should transition to the jdbc-ping stack.
Consequently, the Keycloak Operator now uses the jdbc-ping cache stack by default.
5.3. method RequiredActionProvider.getMaxAuthAge() Copia collegamentoCollegamento copiato negli appunti!
The method RequiredActionProvider.getMaxAuthAge() is deprecated. It is effectively not used now. Please use the method RequiredActionProvider.getMaxAuthAge(KeycloakSession session) instead. This is due to enable individual configuration for required actions.
5.4. spi-connections-infinispan-quarkus-site-name Copia collegamentoCollegamento copiato negli appunti!
The option spi-connections-infinispan-quarkus-site-name is deprecated and no longer used for multi-site setups, and it will be removed in the future. Use spi-cache-embedded-default-site-name instead in setups when running with embedded distributed caches. See All provider configuration for more details on these options.
5.5. Proprietary protocol for client initiated linking to the identity provider account Copia collegamentoCollegamento copiato negli appunti!
When you want the user, who is authenticated to your client application, to link his or her account to a specific identity provider, consider using the Application initiated action (AIA) based mechanism with the action idp_link. The proprietary custom protocol for client initiated account linking is deprecated now and might be removed in the future versions. For more information, see the Client initiated account link section of the Server Developer Guide.
5.6. Instagram Identity Broker Copia collegamentoCollegamento copiato negli appunti!
In this release, the Instagram Identity Broker is deprecated for removal and is not enabled by default. If you are using this broker, it is recommended to use the Facebook Identity Broker instead.
If you are using the Instagram Identity Broker and want to re-enable it, you can do it by enabling the instagram-broker feature using the features server option:
--features=instagram-broker
--features=instagram-broker
5.7. Local admin Copia collegamentoCollegamento copiato negli appunti!
UrlType.LOCAL_ADMIN and the corresponding welcome theme variable localAdminUrl have been deprecated for eventual removal. The default welcome resource will now simply mention localhost rather than providing a URL when an admin user has yet to be created.
5.8. Password policy Recovery Codes Warning Threshold Copia collegamentoCollegamento copiato negli appunti!
In relation to supported Recovery codes, we deprecated the password policy Recovery Codes Warning Threshold. This password policy might be removed in the future major version of Red Hat build of Keycloak. This password policy was not related to passwords at all, but was related to recovery codes, and hence using password policy is an inappropriate way to configure this threshold. It is better to use the Warning Threshold configuration option of the Recovery Authentication Codes required action. For more details, see Recovery Codes.
5.9. Scope.getPropertyNames Copia collegamentoCollegamento copiato negli appunti!
The org.keycloak.Config.Scope.getPropertyNames method has been deprecated for removal.
5.10. displayTest field in ConsentScopeRepresentation Copia collegamentoCollegamento copiato negli appunti!
The displayTest field in the ConsentScopeRepresentation class returned by the Account REST service has been deprecated due to a typo in its name. A new field displayText with the correct spelling has been added to replace it. The old field will be removed in Red Hat build of Keycloak 27.0. The Typescript code ConsentScopeRepresentation for the Account Console already contains only the new field.
5.11. Lifetime of offline session caches Copia collegamentoCollegamento copiato negli appunti!
The options --spi-user-sessions--infinispan--offline-session-cache-entry-lifespan-override and --spi-user-sessions--infinispan--offline-client-session-cache-entry-lifespan-override are now deprecated for removal.
Instead use the options cache-embedded-offline-sessions-max-count and cache-embedded-offline-client-sessions-max-count to limit the memory usage if the default of 10000 cache offline user and client sessions does not work in your scenario.
5.12. Passkeys Conditional UI Authenticator Copia collegamentoCollegamento copiato negli appunti!
The authenticator Passkeys Conditional UI Authenticator is deprecated and disabled by default. It now requires the feature passkeys_conditional_ui_authenticator to be explicitly enabled during server startup. This allows administrators to start the server and re-configure authentication flows for passkeys authentication in a recommended way as described in the Passkeys chapter in the Server Administration Guide. A future major version will remove the feature and the Passkeys Conditional UI Authenticator.
5.13. Modifying default cache configurations in the cache config file Copia collegamentoCollegamento copiato negli appunti!
All Red Hat build of Keycloak default cache configurations have been removed from conf/cache-ispn.xml. Configuration of the default cache configurations in conf/cache-ispn.xml, or in a custom file via --cache-config-file, without specifying --cache-config-mutate=true is now deprecated and will log a warning.
In a future major release, the start-up will fail if default cache configurations are stated in those files and the option is not specified.
5.14. Simplified API for UserSessionProvider Copia collegamentoCollegamento copiato negli appunti!
In order to retrieve a client session via UserSessionProvider#getClientSession, you no longer need to pass in the client session ID. The old methods have been deprecated and will be removed in a future release. You should also review the other methods that are deprecated for removal in this class.
5.15. Simplified API for AuthenticatedClientSessionModel Copia collegamentoCollegamento copiato negli appunti!
The clientId note in the authenticated client session is an internal note present only when using the embedded caches, and is now deprecated for removal. Instead, use the getClient() method.
5.16. Sending OpenID Connect client secret by basic authentication without URL encoding Copia collegamentoCollegamento copiato negli appunti!
In a scenario where Red Hat build of Keycloak acts as a broker and connects by OpenID Connect to another identity provider, you can choose to send the client secret as Client secret sent as HTTP Basic authentication without URL encoding (client_secret_basic_unencoded). While this violates RFC6749, it can be used to keep the default behavior of earlier versions of Red Hat build of Keycloak.