fix(deps): update keycloakclientversion to v26 (major) #603
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
This PR contains the following updates:
25.0.6
->26.3.1
25.0.6
->26.0.6
Release Notes
keycloak/keycloak (org.keycloak:keycloak-core)
v26.3.1
Compare Source
Upgrading
Before upgrading refer to the migration guide for a complete list of changes.
All resolved issues
Enhancements
infinispan
Bugs
dist/quarkus
storage
account/api
dist/quarkus
operator
docs
core
v26.3.0
Compare Source
Highlights
This release delivers advancements to optimize your system and improve the experience of users, developers and administrators:
Account recovery with 2FA recovery codes, protecting users from lockout.
Simplified experiences for application developers with streamlined WebAuthn/Passkey registration and simplified account linking to identity providers via application initiated actions.
Broader connectivity with the ability to broker with any OAuth 2.0 compliant authorization server, and enhanced trusted email verification for OpenID Connect providers.
Asynchronous logging for higher throughput and lower latency, ensuring more efficient deployments.
For administrators, experimental rolling updates for patch releases mean minimized downtime and smoother upgrades.
Read on to learn more about each new feature, and find additional details in the upgrading guide if you are upgrading from a previous release of Keycloak.
Recovering your account if you lose your 2FA credentials
When using for example a one-time-password (OTP) generators as a second factor for authenticating users (2FA), a user can get locked out of their account when they, for example, lose their phone that contains the OTP generator. To prepare for such a case, the recovery codes feature allows users to print a set of recovery codes as an additional second factor. If the recovery codes are then allowed as an alternative 2FA in the login flow, they can be used instead of the OTP generated passwords.
With this release, the recovery codes feature is promoted from preview to a supported feature. For newly created realms, the browser flow now includes the Recovery Authentication Code Form as Disabled, and it can be switched to Alternative by admins if they want to use this feature.
For more information about this 2FA method, see the Recovery Codes chapter in the Server Administration Guide.
Performance improvements to import, export and migration
The time it takes to run imports, exports or migrations involving a large number of realms has been improved. There is no longer a cumulative performance degradation for each additional realm processed.
Simplified registration for WebAuthn and Passkeys
Both WebAuthn Register actions (
webauthn-register
andwebauthn-register-passwordless
) which are also used for Passkeys now support a parameterskip_if_exists
when initiated by the application (AIA).This should make it more convenient to use the AIA in scenarios where a user has already set up WebAuthn or Passkeys. The parameter allows skipping the action if the user already has a credential of that type.
For more information, see the Registering WebAuthn credentials using AIA chapter in the Server Administration Guide.
Simplified linking of the user account to an identity provider
Client-initiated linking a user account to the identity provider is now based on application-initiated action (AIA) implementation. This functionality aligns configuring this functionality and simplifies the error handling the calling of the client application, making it more useful for a broader audience.
The custom protocol, which was previously used for client-initiated account linking, is now deprecated.
Brokering with OAuth v2 compliant authorization servers
In previous releases Keycloak already supported federation with other OpenID Connect and SAML providers, as well as with several Social Providers like GitHub and Google which are based on OAuth 2.0.
The new OAuth 2.0 broker now closes the gap to federate with any OAuth 2.0 provider. This then allows you to federate, for example, with Amazon or other providers. As this is a generic provider, you will need to specify the different claims and a user info endpoint in the provider’s configuration.
For more information, see the OAuth v2 identity providers chapter in the Server Administration Guide.
Trusted email verification when brokering OpenID Connect Providers
Until now, the OpenID Connect broker did not support the standard
email_verified
claim available from the ID Tokens issued by OpenID Connect Providers.Starting with this release, Keycloak supports this standard claim as defined by the OpenID Connect Core Specification for federation.
Whenever users are federated for the first time or re-authenticating and if the Trust email setting is enabled, Sync Mode is set to
FORCE
and the provider sends theemail_verified
claim, the user account will have their email marked according to theemail_verified
claim. If the provider does not send the claim, it defaults to the original behavior and sets the email as verified.Asynchronous logging for higher throughput and lower latency
All available log handlers now support asynchronous logging capabilities. Asynchronous logging helps deployments that require high throughput and low latency.
For more details on this opt-in feature, see the Logging guide.
Rolling updates for patch releases for minimized downtime (preview)
In the previous release, the Keycloak Operator was enhanced to support performing rolling updates of the Keycloak image if both images contain the same version. This is useful, for example, when switching to an optimized image, changing a theme or a provider source code.
In this release, we extended this to perform rolling update when the new image contains a future patch release from the same
major.minor
release stream as a preview feature. This can reduce the service’s downtime even further, as downtime is only needed when upgrading from a different minor or major version.Read more on how to enable this feature in update compatibility command.
Passkeys integrated in the default username forms
In this release Keycloak integrates Passkeys in the default authentications forms. A new switch Enable Passkeys is available in the configuration, Authentication → Policies → Webauthn Passwordless Policy, that seamlessly incorporates passkeys support to the realm. With just one click, Keycloak offers conditional and modal user interfaces in the default login forms to allow users to authenticate with a passkey.
The Passkeys feature is still in preview. Follow the Enabling and disabling features guide to enable it.
For more information, see Passkeys section in the Server Administration Guide.
Upgrading
Before upgrading refer to the migration guide for a complete list of changes.
All resolved issues
New features
operator
dist/quarkus
authentication/webauthn
account/api
authentication
authentication/webauthn
authentication/webauthn
Enhancements
admin/api
dist/quarkus
account/api
dist/quarkus
authentication
admin/ui
admin/ui
admin/ui
admin/ui
organizations
organizations
core
translations
authentication
authentication
core
core
authentication
docs
testsuite
authentication
authentication
authentication
authentication
docs
docs
docs
admin/api
docs
docs
oid4vc
docs
docs
user-profile
dist/quarkus
dist/quarkus
infinispan
oidc
oidc
oidc
oidc
oidc
identity-brokering
oidc
oidc
authentication
oidc
oidc
saml
oidc
oidc
oidc
authentication/webauthn
authentication/webauthn
admin/ui
oidc
oidc
oidc
oidc
authentication
operator
admin/ui
translations
docs
oidc
docs
authentication
translations
infinispan
translations
translations
authentication
admin/client-java
Bugs
authentication/webauthn
admin/api
account/ui
identity-brokering
login/ui
authentication
ci
authentication
ci
dist/quarkus
login/ui
login/ui
admin/ui
authentication
account/ui
ci
authentication
ldap
admin/ui
identity-brokering
admin/ui
admin/ui
ldap
core
admin/ui
ci
admin/ui
testsuite
import-export
testsuite
admin/ui
admin/fine-grained-permissions
admin/ui
ci
core
dist/quarkus
admin/ui
ldap
dist/quarkus
identity-brokering
admin/ui
admin/fine-grained-permissions
admin/ui
operator
admin/ui
account/ui
ci
admin/ui
docs
ci
operator
core
organizations
admin/ui
dist/quarkus
identity-brokering
admin/api
admin/fine-grained-permissions
ci
docs
infinispan
admin/fine-grained-permissions
docs
admin/ui
account/ui
storage
admin/api
admin/ui
admin/ui
authentication
ldap
operator
oidc
ldap
admin/ui
admin/fine-grained-permissions
oidc
core
admin/ui
account/ui
dist/quarkus
infinispan
core
docs
oidc
admin/ui
ci
ci
oid4vc
docs
admin/fine-grained-permissions
admin/fine-grained-permissions
admin/ui
dist/quarkus
infinispan
organizations
admin/ui
dependencies
account/ui
docs
admin/api
dependencies
core
core
admin/ui
authentication
docs
organizations
ci
core
docs
testsuite
ldap
admin/ui
organizations
organizations
ci
docs
dist/quarkus
infinispan
translations
admin/fine-grained-permissions
login/ui
admin/ui