このコンテンツは選択した言語では利用できません。

Release Notes


Red Hat Single Sign-On 7.2

For Use with Red Hat Single Sign-On 7.2

Red Hat Customer Content Services

Abstract

These release notes contain important information related to Red Hat Single Sign-On 7.2

Chapter 1. Overview

The Red Hat Single Sign-On (RH-SSO) Server, based on the Keycloak project, enables you to secure your web applications by providing Web SSO capabilities based on popular standards such as SAML 2.0, OpenID Connect, and OAuth 2.0. The Server can act as a SAML or OpenID Connect–based identity provider (IdP), mediating with your enterprise user directory or third-party identity provider for identity information and your applications using standards-based tokens.

The following notes apply to the RH-SSO 7.2 release.

Chapter 2. Feature Overview

Some of the new features in this release are technology preview features, which means they are available, but not fully supported. You may use these for testing, but features marked for technology preview will not be supported if used in production and are marked as technology preview in this list and in our documentation. Because they are not fully supported for production use, technology preview features are disabled by default, but the features can be enabled if you want to try them out. We are seeking feedback on the technology preview features, please log a support ticket if you have comments on a technology preview feature.

2.1. Clustered database support

RH-SSO is now supported on Oracle RAC and MySQL/Galera clusters.

2.2. No-import LDAP option

No-import LDAP reduces the load on the RH-SSO database. User data is not imported into the RH-SSO database, and all user data requests are forwarded to LDAP. Initial import of the data and ongoing synchronization are eliminated.

2.3. Blacklisted password policy

Administrators can now provide a list of blacklisted passwords, ensuring that end users cannot select specific banned passwords.

2.4. X.509 user authentication

Browser and Direct Grant authentication flows now support user authentication via X.509 Certificates.

2.5. New adapters

Adapters for Spring Boot applications and Servlet based applications are now available and generally supported.

An adapter for Elytron, the new security subsystem for Red Hat JBoss EAP is generally available. The adapter enables SSO with the EAP Administrative console and the management CLI.

2.6. Additional social logins

Social login with GitLab, BitBucket, OpenShift, and PayPal have been added to the list of social login providers supported by RH-SSO.

2.7. Cross-Datacenter Replication Mode

Cross-Datacenter Replication mode allows you to run RH-SSO in a cluster across multiple data centers, most typically using data center sites that are in different geographic regions. When using this mode, each data center will have its own cluster of Red Hat Single Sign-On servers.

This functionality is in technology preview and should not be used in production environments.

2.8. Token exchange

Token exchange is the process of using a token to obtain an entirely different token. A client may want to invoke on a less trusted application so it may want to downgrade the current token it has. A client may want to exchange a {project_token} for a token stored for a linked social provider account. You may want to trust external tokens minted by other RH-SSO realms or foreign IDPs. A client may have a need to impersonate a user.

Token exchange in RH-SSO is a very loose implementation of the OAuth Token Exchange specification at the IETF. We have extended it a little, ignored some of it, and loosely interpreted other parts of the specification. It is a simple grant type invocation on a realm’s OpenID Connect token endpoint.

This functionality is in technology preview and should not be used in production environments.

2.9. Fine-grained permissions for admin endpoints/console

Sometimes roles like manage-realm or manage-users do not give you the ability to specify permissions with the level of control you may desire and you want to create restricted admin accounts that have more precise permissions. RH-SSO allows you to define and assign restricted access policies for managing a realm, such as managing only one specific client or the users of a specific group.

Note that:

  • Fine-grained permissions are only available within dedicated admin consoles and admins defined within those realms. You cannot define cross-realm fine grained permissions.
  • Fine-grained permissions are used to grant additional permissions. You cannot override the default behavior of the built in admin roles.

This functionality is in technology preview and should not be used in production environments.

2.10. Authorization services remains in tech preview

RH-SSO 7.1 introduced a new authorization service feature-set, based on the User Managed Access (UMA) specification. This enables RH-SSO Server to act as a Policy Administration Point (PAP), Policy Decision Point (PDP), or Policy Information Point (PIP), separating the authorization logic from the application.

This functionality is in technology preview and should not be used in production environments, as we plan to update to to UMA 2.0.

Chapter 3. Supported Configurations

3.1. Supported Configurations

The set of supported features and configurations for RH-SSO Server 7.2 is available on the Customer Portal.

Chapter 4. Component Versions

4.1. Component Versions

The list of supported component versions for RH-SSO 7.2 is available on the Customer Portal.

Chapter 5. Known Issues

5.1. Known Issues

The following are known issues for this release.

  • KEYCLOAK-4976 - AbstractUserAdapterFederatedStorage.setSingleAttribute(,) causing deadlocks on MSSQL
  • KEYCLOAK-5411 - MSSQL client creation deadlocks
  • KEYCLOAK-6142 - Manual configuration page for the OTP doesn’t reflect HOTP
  • KEYCLOAK-6171 and KEYCLOAK-6286 - Node.js and Java adapters for RH-SSO 7.1 don’t remove "session_state" from URL after login to RH-SSO 7.2 The issue should only affect users who were logged in but inactive before an RH-SSO upgrade who then find themselves logged out after the RHSSO upgrade is complete when they attempt to use that same session. The workaround is that the users must log in again.
  • KEYCLOAK-6309 - Eap6 SAML filter fails while downloading keys from Keycloak server when SSL is enabled Two workarounds are available. You may either use bouncy castle version 1.52 instead of 1.56 OR you may start EAP6 with the argument `-Dcom.sun.net.ssl.enableECC=false.
  • KEYCLOAK-6451 - Adapter RPMs have an obsolete dependency, meaning that any customer who previously installed adapters using RPMs that executes yum update will find the package updated. The workaround is to exclude the adapter package from yum update.
  • When a resource permission is created with no associated policies and you try to update the permission, the Save button is not enabled in the Resource Permission UI when adding new policies to the permission.
  • Authorization services client does not support JDK7 At the moment, this means you must use Java 8 if you want to try the new authorization services, which are currently in technology preview.

Chapter 6. Fixed Issues

6.1. Fixed Issues

Nearly 1,000 issues were resolved in this release.

Legal Notice

Copyright © 2018 Red Hat, Inc.
Licensed under the Apache License, Version 2.0 (the "License"); you may not use this file except in compliance with the License. You may obtain a copy of the License at
Unless required by applicable law or agreed to in writing, software distributed under the License is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the License for the specific language governing permissions and limitations under the License.
Red Hat logoGithubRedditYoutubeTwitter

詳細情報

試用、購入および販売

コミュニティー

Red Hat ドキュメントについて

Red Hat をお使いのお客様が、信頼できるコンテンツが含まれている製品やサービスを活用することで、イノベーションを行い、目標を達成できるようにします。

多様性を受け入れるオープンソースの強化

Red Hat では、コード、ドキュメント、Web プロパティーにおける配慮に欠ける用語の置き換えに取り組んでいます。このような変更は、段階的に実施される予定です。詳細情報: Red Hat ブログ.

会社概要

Red Hat は、企業がコアとなるデータセンターからネットワークエッジに至るまで、各種プラットフォームや環境全体で作業を簡素化できるように、強化されたソリューションを提供しています。

© 2024 Red Hat, Inc.