Keycloak - Package Updates
-
[1.3.3]
- Update keycloak to 26.3.3
- Full Changelog
- #39562 Breaking template change: Unknown
locale
input field added to user-profile registration page <code>user-profile</code> - #40984 Backchannel logout token with an unexpected signature algorithm key <code>oidc</code>
- #41023 Can't send e-mails to international e-mail addresses: bad UTF-8 syntax <code>core</code>
- #41098 Locked out after upgrade to 26.3.1 due to missing sub in lightweight access token <code>core</code>
- #41268
--optimized
flag and providers jar are incompatible when used with tools changinglast-modify-date
<code>dist/quarkus</code> - #41290 Concurrent starts with JDBC_PING lead to a split cluster <code>infinispan</code>
- #41390 JDBC_PING2 doesn't merge split clusters after a while <code>infinispan</code>
- #41421 Broken link securing-cache-communication in caching docs <code>docs</code>
- #41423 Duplicate IDs in generated all configuration docs <code>docs</code>
- #41469 Uncaught exception cases unclosed spans in tracing <code>dist/quarkus</code>
-
[1.3.4]
- Update keycloak to 26.3.4
- Full Changelog
- #40630 Double check when working with multithreading. SAST
- #42245 Upgrade to Quarkus 3.20.2.2
- #35825 Per client session idle time capped by realm level client idle timeout core
- #40374 Random but frequent duplicate key value violates unique constraint "constraint_offl_us_ses_pk2" errors authentication
- #40463 Login to Account Console produces two consecutive LOGIN events account/ui
- #40857 Unbounded login_hint Parameter Can Corrupt KC_RESTART Cookie and Break Login Flow oidc
- #41427 Parallel token exchange fails if client session is expired token-exchange
- #41801 Lack of coordination in database creation in 26.3.0 causes deployment failures (Reopen) core
- #41942 Uncaught server error: org.keycloak.models.ModelException: Database operation failed : Sync LDAP Groups to Keycloak (Custom Provider) core
- #42012 Client session timestamp not updated in the database if running multiple nodes infinispan
-
[1.3.5]
- Update keycloak to 26.3.5
- Full Changelog
-
[1.4.0]
- Update keycloak to 26.4.0
- Full Changelog
- Passkeys for seamless, passwordless authentication of users.
- Federated Client Authentication to use SPIFFE or Kubernetes service account tokens for client authentication.
- Simplified deployments across multiple availability zones to boost availability.
- FAPI 2 Final: Keycloak now supports the final specifications of FAPI 2.0 Security Profile and FAPI 2.0 Message Signing.
- DPoP: The OAuth 2.0 Demonstrating Proof-of-Possession at the Application Layer (DPoP) is now fully supported. Improvements include the ability to bind only refresh tokens for public clients, and securing all Keycloak endpoints with DPoP tokens.
- FIPS 140-2 mode now supports EdDSA
- Listing supported OAuth standards on one page
- Automatic certificate management for SAML clients
- Update Email Workflow (supported)
- Optional email domain for organizations
-
[1.4.1]
- Update keycloak to 26.4.1
- Full Changelog
- #43020 Secure Client-Initiated Renegotiation - disable by default
dist/quarkus
- #42990 Hide read-only email attribute in update profile context with update email enabled
user-profile
- #43357 JDBC_PING should publish its physical address on startup
- #40965 Group permission denies to view user
admin/fine-grained-permissions
- #41292 openid-connect flow is missing response type on language change
authentication
- #42565 Standard Token Exchange: chain of exchanges eventually fails
token-exchange
- #42676 Security Defenses realm settings lost when switching between Headers and Brute Force Detection tabs (v25+)
admin/ui
- #42907 Race condition in authorization service leads to NullPointerException when evaluating permissions during concurrent resource deletion
authorization-services
- #43042 Avoid NPE in FederatedJWTClientAuthenticator when checking for supported assertion types
core
- #43070 Update email page with pending verification email messages prefilled with old email
user-profile