Luca Paganin
fb942c11d8
feat: add unit tests
2 years ago
Luca Paganin
9bff615fec
feat: add docstrings
2 years ago
Luca Paganin
5bc5d4f321
feat: add functions covering some missing REST API calls
2 years ago
Richard Nemeth
1c6524e4db
fix: check client existence based on clientId
Remove the necessity for supplying client name for create a new client
request, also don't check existing clients based on client name as those
can be duplicate
BREAKING CHANGE: Renamed parameter client_name to client_id in get_client_id method
Closes #351
2 years ago
Richard Nemeth
25f1f68705
style: fix docstring for docs pages
2 years ago
Richard Nemeth
5e6c775735
style: fixed docstrings everywhere
2 years ago
Fredrik Lindner
81b3cc80db
docs: add timeout to docstring
3 years ago
Richard Nemeth
bead0aff2b
fix: raise correct exceptions
3 years ago
Chuma Umenze
e7152e5c74
build: use poetry for package management
3 years ago
Fredrik Lindner
d2a6262d61
feat: Ability to set custom timeout for KCOpenId and KCAdmin
3 years ago
Erik Cederstrand
2f212c1350
feat: Allow fetching existing policies before calling create_client_authz_client_policy()
3 years ago
Erik Cederstrand
667d1e088e
feat: support token exchange config via admin API
This adds support for the basic endpoints necessary to configure client-to-client token exchange.
The /authz API is lacking official documentation. Basic docs added to docstrings instead.
3 years ago
Bruno Bonfils
bcdf1b825b
feat: Add update_idp
3 years ago
Bruno Bonfils
f3de47e1b3
feat: Add update_mapper_in_idp
3 years ago
Bruno Bonfils
9a13f67fea
feat: Add get_idp_mappers, fix #329
3 years ago
Richard Nemeth
e95649a93c
fix: fixed bugs in events methods
3 years ago
Richard Nemeth
e56889e5db
fix: fixed components bugs
3 years ago
Richard Nemeth
8c8c0e8141
fix: use param for update client mapper
3 years ago
Richard Nemeth
1029e46a68
feat: added new methods for client scopes
3 years ago
Richard Nemeth
d9c3326fd1
fix: allow query parameters for users count
3 years ago
Jackson Kwok
fe160531f4
fix: allow client_credentials token if username and password not specified
3 years ago
Richard Nemeth
960af199b4
fix: escape when get role fails
3 years ago
Richard Nemeth
54beb51fba
chore: move source files into src folder
Moved all of the source files into the src folder
3 years ago
Richard Nemeth
fa9e56ef42
feat: added authenticator providers getters
3 years ago
Richard Nemeth
6cce29f26b
fix: full tox fix ready
3 years ago
Richard Nemeth
b911d94db9
feat: fixed admin client to pass the tests
3 years ago
Richard Nemeth
8d19ea8180
fix: raise correct errors
3 years ago
Richard Nemeth
cc82e6a874
feat: initial setup of CICD and linting
3 years ago
Bruno Bonfils
25b9097fd1
Add 202 expected return code when update flow #288
3 years ago
Bruno Bonfils
64d74be6af
Add support of TOTP to KeycloakAdmin
3 years ago
maxnoto
17b507427f
Bugfix get_group_members
3 years ago
Salem Wafi
b57d884718
Fix the issue of the token getting expire for some functions in the keycloak admin
3 years ago
carlos
7cef48f725
Fix get_groups() so that it returns groups and not users
3 years ago
Marcos Pereira Jr
28c82d1051
Removed unsed import.
3 years ago
Marcos Pereira Jr
4ba3007e41
Reverted connection deepcopy on KeycloakAdmin
3 years ago
Konstantin Köhring
738e9ecc70
Add methods to get available and composite realm roles of a user
3 years ago
Salem Wafi
a29f282c69
#262 Added three functions to get all the client's authorization scopes, permissions, policies using Keycloak Admin
3 years ago
modularTaco
9abbf559ac
add client session stats
Signed-off-by: modularTaco <37046961+modularTaco@users.noreply.github.com>
3 years ago
ggallard
9777a85fa0
fixed typo in URL pattern
3 years ago
ggallard
95c4a7ee2d
added delete_authentication_flow(flow_id)
3 years ago
ggallard
76b6798429
added get/delete authentication_flow_execution(execution_id)
3 years ago
ggallard
c538d8fb32
added get/add/delete default (default/optional) client scopes
3 years ago
robsonyeg
a6ad87d62c
fix invalid credential error and refresh_code not exist error
3 years ago
Ryan Gard
7ee625d063
Enable Keycloak Admin for Non-master Realms
Allow the 'KeycloakAdmin' class to instantiate against non-master realms using
an Authorization header for a non-admin user that is granted permissions to
inspect or manage Keycloak admin resources.
Example:
kca = KeycloakAdmin(
'https://auth.keycloak.local/auth/ ',
realm_name='my-realm',
client_id='admin',
custom_headers=auth_headers
)
3 years ago
lcgkm
80bb7a56b5
Fix invalid permission type
A permission associates the object being protected and the policies that must be evaluated to decide whether access should be granted.
Permissions can be created to protect two main types of objects:
1. Resources
2. Scopes
3 years ago
lcgkm
10c212cce5
Refine comments
3 years ago
lcgkm
656de1c466
Add more comments
3 years ago
lcgkm
3b93754d27
Add new AuthZ API support
NOTE: These are private API, will be changed later.
3 years ago
Tobias Henkel
a37bf45c77
Add delete_user_social_login
This makes it possible to delete federated identities without having
to use raw requests.
3 years ago
Nikolay Amiantov
d0894d4352
Don't force realm name when using secret key
Using other realms can be useful, for example, to manage realm users with restricted rights.
3 years ago