-
Notifications
You must be signed in to change notification settings - Fork 14
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Updates to KeyCloak - start after Feb25 #4343
Comments
Hello SSO Friends, In preparation for this upgrade, we highlighted some important updates regarding RHBK 26 that may require action from you to keep the integration between the SSO service and your app working. The full release note can be found here.
If your application links to Keycloak server with URLs such as: /js/keycloak-authz.js /js/keycloak-authz.min.js /js/keycloak.js /js/keycloak.min.js /js/{version}/keycloak-authz.js /js/{version}/keycloak-authz.min.js /js/{version}/keycloak.js /js/{version}/keycloak.min.js you will not have access to the file(s) once we upgrade to RHBK26, and your users will not be able to authenticate through your app. By Red Hat build of Keycloak 26.0 Upgrading Guide, you should now include the library in your project using a package manager such as NPM. The library is available on the NPM registry as keycloak-js.
Previous versions of Keycloak had supported automatic logout of the user and redirect to the application by opening logout endpoint URL with redirect_uri parameter. We communicated with the community that this functionality was deprecated in Keycloak 18 and now has been removed in RHBK 26. We recommend including id_token_hint and post_logout_redirect_uri parameters.
When a user is already logged in to one browser tab and an authentication session expired in another browser tab, RHBK 26 redirects back to the client application with an OIDC/SAML error. Note that the message You are already logged in does not appear to the end user when an authentication session expires and user is already logged in. You may consider updating your applications to handle this error. Please reach out to us if you have more questions about this error.
Claim sub and auth_time are added by protocol mapper, which are still added to the ID token and access token as before, but not to the lightweight access token Claim nonce is added only to the ID token by default Claim session_state is not added to any token now by default. The other dedicated claim sid is still supported by the specification, which was available in previous versions and has exactly the same value For backward compatibility, through protocol mappers, SSO team adds nonce and session_state claims for standard clients. If you are a custom client, please review your token claim usage, and configure accordingly. More details can be found here.
RHBK now restricts responses to 10 MB by default. If you expect the payload from your app to be this big, please contact us.
Through client profiles security best practices such as signatures, prohibition of SAML Redirect binding and prohibition of wildcard redirect URLs are enforced for SAML clients |
The next keycloak upgrade is scheduled to take place between Feb 25 (Dev/TEST) & Mar 25 (PROD) 2025. SIMS team needs to review the notes for impact and make changes accordingly.
Summary:
See notes in comments.
Technical
The text was updated successfully, but these errors were encountered: