Modifier and Type | Field and Description |
---|---|
protected RealmModel |
RequiredActionContextResult.realm |
protected RealmModel |
AuthenticationProcessor.realm |
Modifier and Type | Method and Description |
---|---|
RealmModel |
RequiredActionContextResult.getRealm() |
RealmModel |
AuthenticationProcessor.getRealm() |
RealmModel |
AuthenticationProcessor.Result.getRealm() |
RealmModel |
RequiredActionContext.getRealm() |
RealmModel |
FormContext.getRealm()
Current realm
|
RealmModel |
AbstractAuthenticationFlowContext.getRealm()
Current realm
|
Modifier and Type | Method and Description |
---|---|
default boolean |
Authenticator.areRequiredActionsEnabled(KeycloakSession session,
RealmModel realm)
Checks if all required actions are configured in the realm and are enabled
|
static ClientSessionContext |
AuthenticationProcessor.attachSession(AuthenticationSessionModel authSession,
UserSessionModel userSession,
KeycloakSession session,
RealmModel realm,
ClientConnection connection,
EventBuilder event) |
boolean |
FormAction.configuredFor(KeycloakSession session,
RealmModel realm,
UserModel user)
Is this FormAction configured for the current user?
|
boolean |
Authenticator.configuredFor(KeycloakSession session,
RealmModel realm,
UserModel user)
Is this authenticator configured for this user.
|
static AuthenticationExecutionModel |
AuthenticatorUtil.findExecutionByAuthenticator(RealmModel realm,
String flowId,
String authProviderId) |
default List<CredentialModel> |
CredentialValidator.getCredentials(KeycloakSession session,
RealmModel realm,
UserModel user) |
static List<AuthenticationExecutionModel> |
AuthenticatorUtil.getEnabledExecutionsRecursively(RealmModel realm,
String flowId) |
static boolean |
AuthenticatorUtil.isEnabled(RealmModel realm,
String flowId,
String authProviderId) |
static boolean |
AuthenticatorUtil.isRequired(RealmModel realm,
String flowId,
String authProviderId) |
static void |
AuthenticatorUtil.recurseExecutions(RealmModel realm,
String flowId,
List<AuthenticationExecutionModel> executions) |
AuthenticationProcessor |
AuthenticationProcessor.setRealm(RealmModel realm) |
void |
FormAction.setRequiredActions(KeycloakSession session,
RealmModel realm,
UserModel user)
Set actions to configure authenticator
|
void |
Authenticator.setRequiredActions(KeycloakSession session,
RealmModel realm,
UserModel user)
Set actions to configure authenticator
|
Constructor and Description |
---|
RequiredActionContextResult(AuthenticationSessionModel authSession,
RealmModel realm,
EventBuilder eventBuilder,
KeycloakSession session,
org.jboss.resteasy.spi.HttpRequest httpRequest,
UserModel user,
RequiredActionFactory factory) |
Modifier and Type | Method and Description |
---|---|
RealmModel |
ActionTokenContext.getRealm() |
Modifier and Type | Method and Description |
---|---|
String |
DefaultActionToken.serialize(KeycloakSession session,
RealmModel realm,
javax.ws.rs.core.UriInfo uri)
Updates the following fields and serializes this token into a signed JWT.
|
Constructor and Description |
---|
ActionTokenContext(KeycloakSession session,
RealmModel realm,
javax.ws.rs.core.UriInfo uriInfo,
ClientConnection clientConnection,
org.jboss.resteasy.spi.HttpRequest request,
EventBuilder event,
ActionTokenHandler<T> handler,
String executionId,
ActionTokenContext.ProcessAuthenticateFlow processFlow,
ActionTokenContext.ProcessBrokerFlow processBrokerFlow) |
Modifier and Type | Method and Description |
---|---|
boolean |
AttemptedAuthenticator.configuredFor(KeycloakSession session,
RealmModel realm,
UserModel user) |
void |
AttemptedAuthenticator.setRequiredActions(KeycloakSession session,
RealmModel realm,
UserModel user) |
Modifier and Type | Method and Description |
---|---|
boolean |
IdpReviewProfileAuthenticator.configuredFor(KeycloakSession session,
RealmModel realm,
UserModel user) |
boolean |
IdpEmailVerificationAuthenticator.configuredFor(KeycloakSession session,
RealmModel realm,
UserModel user) |
boolean |
IdpCreateUserIfUniqueAuthenticator.configuredFor(KeycloakSession session,
RealmModel realm,
UserModel user) |
boolean |
IdpConfirmLinkAuthenticator.configuredFor(KeycloakSession session,
RealmModel realm,
UserModel user) |
boolean |
IdpAutoLinkAuthenticator.configuredFor(KeycloakSession session,
RealmModel realm,
UserModel user) |
static UserModel |
AbstractIdpAuthenticator.getExistingUser(KeycloakSession session,
RealmModel realm,
AuthenticationSessionModel authSession) |
void |
AbstractIdpAuthenticator.setRequiredActions(KeycloakSession session,
RealmModel realm,
UserModel user) |
Modifier and Type | Method and Description |
---|---|
boolean |
WebAuthnAuthenticator.configuredFor(KeycloakSession session,
RealmModel realm,
UserModel user) |
boolean |
UsernamePasswordForm.configuredFor(KeycloakSession session,
RealmModel realm,
UserModel user) |
boolean |
SpnegoAuthenticator.configuredFor(KeycloakSession session,
RealmModel realm,
UserModel user) |
boolean |
ScriptBasedAuthenticator.configuredFor(KeycloakSession session,
RealmModel realm,
UserModel user) |
boolean |
PasswordForm.configuredFor(KeycloakSession session,
RealmModel realm,
UserModel user) |
boolean |
OTPFormAuthenticator.configuredFor(KeycloakSession session,
RealmModel realm,
UserModel user) |
boolean |
IdentityProviderAuthenticator.configuredFor(KeycloakSession session,
RealmModel realm,
UserModel user) |
boolean |
CookieAuthenticator.configuredFor(KeycloakSession session,
RealmModel realm,
UserModel user) |
void |
WebAuthnPasswordlessAuthenticator.setRequiredActions(KeycloakSession session,
RealmModel realm,
UserModel user) |
void |
WebAuthnAuthenticator.setRequiredActions(KeycloakSession session,
RealmModel realm,
UserModel user) |
void |
UsernamePasswordForm.setRequiredActions(KeycloakSession session,
RealmModel realm,
UserModel user) |
void |
SpnegoAuthenticator.setRequiredActions(KeycloakSession session,
RealmModel realm,
UserModel user) |
void |
ScriptBasedAuthenticator.setRequiredActions(KeycloakSession session,
RealmModel realm,
UserModel user) |
void |
OTPFormAuthenticator.setRequiredActions(KeycloakSession session,
RealmModel realm,
UserModel user) |
void |
IdentityProviderAuthenticator.setRequiredActions(KeycloakSession session,
RealmModel realm,
UserModel user) |
void |
CookieAuthenticator.setRequiredActions(KeycloakSession session,
RealmModel realm,
UserModel user) |
void |
ConditionalOtpFormAuthenticator.setRequiredActions(KeycloakSession session,
RealmModel realm,
UserModel user) |
Modifier and Type | Method and Description |
---|---|
boolean |
NoCookieFlowRedirectAuthenticator.configuredFor(KeycloakSession session,
RealmModel realm,
UserModel user) |
boolean |
BasicAuthOTPAuthenticator.configuredFor(KeycloakSession session,
RealmModel realm,
UserModel user) |
boolean |
BasicAuthAuthenticator.configuredFor(KeycloakSession session,
RealmModel realm,
UserModel user) |
void |
NoCookieFlowRedirectAuthenticator.setRequiredActions(KeycloakSession session,
RealmModel realm,
UserModel user) |
void |
BasicAuthAuthenticator.setRequiredActions(KeycloakSession session,
RealmModel realm,
UserModel user) |
Modifier and Type | Method and Description |
---|---|
boolean |
CliUsernamePasswordAuthenticator.configuredFor(KeycloakSession session,
RealmModel realm,
UserModel user) |
void |
CliUsernamePasswordAuthenticator.setRequiredActions(KeycloakSession session,
RealmModel realm,
UserModel user) |
Modifier and Type | Method and Description |
---|---|
default boolean |
ConditionalAuthenticator.configuredFor(KeycloakSession session,
RealmModel realm,
UserModel user) |
void |
ConditionalUserConfiguredAuthenticator.setRequiredActions(KeycloakSession session,
RealmModel realm,
UserModel user) |
void |
ConditionalRoleAuthenticator.setRequiredActions(KeycloakSession session,
RealmModel realm,
UserModel user) |
Modifier and Type | Method and Description |
---|---|
boolean |
ConsoleUsernamePasswordAuthenticator.configuredFor(KeycloakSession session,
RealmModel realm,
UserModel user) |
void |
ConsoleUsernamePasswordAuthenticator.setRequiredActions(KeycloakSession session,
RealmModel realm,
UserModel user) |
Modifier and Type | Method and Description |
---|---|
boolean |
ValidateUsername.configuredFor(KeycloakSession session,
RealmModel realm,
UserModel user) |
boolean |
ValidatePassword.configuredFor(KeycloakSession session,
RealmModel realm,
UserModel user) |
boolean |
ValidateOTP.configuredFor(KeycloakSession session,
RealmModel realm,
UserModel user) |
void |
ValidateUsername.setRequiredActions(KeycloakSession session,
RealmModel realm,
UserModel user) |
void |
ValidatePassword.setRequiredActions(KeycloakSession session,
RealmModel realm,
UserModel user) |
void |
ValidateOTP.setRequiredActions(KeycloakSession session,
RealmModel realm,
UserModel user) |
Modifier and Type | Method and Description |
---|---|
boolean |
ResetOTP.configuredFor(KeycloakSession session,
RealmModel realm,
UserModel user) |
boolean |
ResetCredentialEmail.configuredFor(KeycloakSession session,
RealmModel realm,
UserModel user) |
boolean |
ResetCredentialChooseUser.configuredFor(KeycloakSession session,
RealmModel realm,
UserModel user) |
boolean |
AbstractSetRequiredActionAuthenticator.configuredFor(KeycloakSession session,
RealmModel realm,
UserModel user) |
static Long |
ResetCredentialEmail.getLastChangedTimestamp(KeycloakSession session,
RealmModel realm,
UserModel user) |
void |
ResetCredentialEmail.setRequiredActions(KeycloakSession session,
RealmModel realm,
UserModel user) |
void |
ResetCredentialChooseUser.setRequiredActions(KeycloakSession session,
RealmModel realm,
UserModel user) |
void |
AbstractSetRequiredActionAuthenticator.setRequiredActions(KeycloakSession session,
RealmModel realm,
UserModel user) |
Modifier and Type | Method and Description |
---|---|
boolean |
AbstractX509ClientCertificateAuthenticator.configuredFor(KeycloakSession session,
RealmModel realm,
UserModel user) |
void |
AbstractX509ClientCertificateAuthenticator.setRequiredActions(KeycloakSession session,
RealmModel realm,
UserModel user) |
Modifier and Type | Method and Description |
---|---|
boolean |
RegistrationUserCreation.configuredFor(KeycloakSession session,
RealmModel realm,
UserModel user) |
boolean |
RegistrationRecaptcha.configuredFor(KeycloakSession session,
RealmModel realm,
UserModel user) |
boolean |
RegistrationProfile.configuredFor(KeycloakSession session,
RealmModel realm,
UserModel user) |
boolean |
RegistrationPassword.configuredFor(KeycloakSession session,
RealmModel realm,
UserModel user) |
void |
RegistrationUserCreation.setRequiredActions(KeycloakSession session,
RealmModel realm,
UserModel user) |
void |
RegistrationRecaptcha.setRequiredActions(KeycloakSession session,
RealmModel realm,
UserModel user) |
void |
RegistrationProfile.setRequiredActions(KeycloakSession session,
RealmModel realm,
UserModel user) |
void |
RegistrationPassword.setRequiredActions(KeycloakSession session,
RealmModel realm,
UserModel user) |
Constructor and Description |
---|
UserUpdateProfileContext(RealmModel realm,
UserModel user) |
Modifier and Type | Method and Description |
---|---|
RealmModel |
AuthorizationProvider.getRealm() |
Modifier and Type | Method and Description |
---|---|
AuthorizationProvider |
DefaultAuthorizationProviderFactory.create(KeycloakSession session,
RealmModel realm) |
AuthorizationProvider |
AuthorizationProviderFactory.create(KeycloakSession session,
RealmModel realm) |
Constructor and Description |
---|
AuthorizationProvider(KeycloakSession session,
RealmModel realm,
PolicyEvaluator policyEvaluator) |
Modifier and Type | Field and Description |
---|---|
protected RealmModel |
UserModelIdentity.realm |
protected RealmModel |
KeycloakIdentity.realm |
protected RealmModel |
ClientModelIdentity.realm |
Constructor and Description |
---|
KeycloakIdentity(IDToken token,
KeycloakSession keycloakSession,
RealmModel realm) |
UserModelIdentity(RealmModel realm,
UserModel user) |
Modifier and Type | Method and Description |
---|---|
protected ScriptModel |
JSPolicyProviderFactory.getScriptModel(Policy policy,
RealmModel realm,
ScriptingProvider scripting) |
protected ScriptModel |
DeployedScriptPolicyFactory.getScriptModel(Policy policy,
RealmModel realm,
ScriptingProvider scripting) |
Modifier and Type | Field and Description |
---|---|
protected RealmModel |
AbstractOAuth2IdentityProvider.Endpoint.realm |
Modifier and Type | Method and Description |
---|---|
void |
OIDCIdentityProvider.backchannelLogout(KeycloakSession session,
UserSessionModel userSession,
javax.ws.rs.core.UriInfo uriInfo,
RealmModel realm) |
Object |
OIDCIdentityProvider.callback(RealmModel realm,
IdentityProvider.AuthenticationCallback callback,
EventBuilder event) |
Object |
KeycloakOIDCIdentityProvider.callback(RealmModel realm,
IdentityProvider.AuthenticationCallback callback,
EventBuilder event) |
Object |
AbstractOAuth2IdentityProvider.callback(RealmModel realm,
IdentityProvider.AuthenticationCallback callback,
EventBuilder event) |
javax.ws.rs.core.Response |
OIDCIdentityProvider.keycloakInitiatedBrowserLogout(KeycloakSession session,
UserSessionModel userSession,
javax.ws.rs.core.UriInfo uriInfo,
RealmModel realm) |
void |
OIDCIdentityProvider.preprocessFederatedIdentity(KeycloakSession session,
RealmModel realm,
BrokeredIdentityContext context) |
void |
OIDCIdentityProviderConfig.validate(RealmModel realm) |
void |
OAuth2IdentityProviderConfig.validate(RealmModel realm) |
Constructor and Description |
---|
Endpoint(IdentityProvider.AuthenticationCallback callback,
RealmModel realm,
EventBuilder event) |
KeycloakEndpoint(IdentityProvider.AuthenticationCallback callback,
RealmModel realm,
EventBuilder event) |
OIDCEndpoint(IdentityProvider.AuthenticationCallback callback,
RealmModel realm,
EventBuilder event) |
Modifier and Type | Method and Description |
---|---|
RealmModel |
AuthenticationRequest.getRealm() |
Modifier and Type | Method and Description |
---|---|
void |
IdentityProvider.backchannelLogout(KeycloakSession session,
UserSessionModel userSession,
javax.ws.rs.core.UriInfo uriInfo,
RealmModel realm) |
void |
AbstractIdentityProvider.backchannelLogout(KeycloakSession session,
UserSessionModel userSession,
javax.ws.rs.core.UriInfo uriInfo,
RealmModel realm) |
Object |
IdentityProvider.callback(RealmModel realm,
IdentityProvider.AuthenticationCallback callback,
EventBuilder event)
JAXRS callback endpoint for when the remote IDP wants to callback to keycloak.
|
Object |
AbstractIdentityProvider.callback(RealmModel realm,
IdentityProvider.AuthenticationCallback callback,
EventBuilder event) |
static void |
IdentityProviderMapperSyncModeDelegate.delegateUpdateBrokeredUser(KeycloakSession session,
RealmModel realm,
UserModel user,
IdentityProviderMapperModel mapperModel,
BrokeredIdentityContext context,
IdentityProviderMapper mapper) |
javax.ws.rs.core.Response |
IdentityProvider.export(javax.ws.rs.core.UriInfo uriInfo,
RealmModel realm,
String format)
Export a representation of the IdentityProvider in a specific format.
|
javax.ws.rs.core.Response |
AbstractIdentityProvider.export(javax.ws.rs.core.UriInfo uriInfo,
RealmModel realm,
String format) |
void |
IdentityProvider.importNewUser(KeycloakSession session,
RealmModel realm,
UserModel user,
BrokeredIdentityContext context) |
void |
AbstractIdentityProvider.importNewUser(KeycloakSession session,
RealmModel realm,
UserModel user,
BrokeredIdentityContext context) |
void |
HardcodedUserSessionAttributeMapper.importNewUser(KeycloakSession session,
RealmModel realm,
UserModel user,
IdentityProviderMapperModel mapperModel,
BrokeredIdentityContext context) |
void |
HardcodedRoleMapper.importNewUser(KeycloakSession session,
RealmModel realm,
UserModel user,
IdentityProviderMapperModel mapperModel,
BrokeredIdentityContext context) |
void |
IdentityProviderMapper.importNewUser(KeycloakSession session,
RealmModel realm,
UserModel user,
IdentityProviderMapperModel mapperModel,
BrokeredIdentityContext context)
Called after UserModel is created for first time for this user.
|
void |
AbstractIdentityProviderMapper.importNewUser(KeycloakSession session,
RealmModel realm,
UserModel user,
IdentityProviderMapperModel mapperModel,
BrokeredIdentityContext context) |
javax.ws.rs.core.Response |
IdentityProvider.keycloakInitiatedBrowserLogout(KeycloakSession session,
UserSessionModel userSession,
javax.ws.rs.core.UriInfo uriInfo,
RealmModel realm)
Called when a Keycloak application initiates a logout through the browser.
|
javax.ws.rs.core.Response |
AbstractIdentityProvider.keycloakInitiatedBrowserLogout(KeycloakSession session,
UserSessionModel userSession,
javax.ws.rs.core.UriInfo uriInfo,
RealmModel realm) |
void |
IdentityProvider.preprocessFederatedIdentity(KeycloakSession session,
RealmModel realm,
BrokeredIdentityContext context) |
void |
AbstractIdentityProvider.preprocessFederatedIdentity(KeycloakSession session,
RealmModel realm,
BrokeredIdentityContext context) |
void |
HardcodedUserSessionAttributeMapper.preprocessFederatedIdentity(KeycloakSession session,
RealmModel realm,
IdentityProviderMapperModel mapperModel,
BrokeredIdentityContext context) |
void |
HardcodedAttributeMapper.preprocessFederatedIdentity(KeycloakSession session,
RealmModel realm,
IdentityProviderMapperModel mapperModel,
BrokeredIdentityContext context) |
void |
IdentityProviderMapper.preprocessFederatedIdentity(KeycloakSession session,
RealmModel realm,
IdentityProviderMapperModel mapperModel,
BrokeredIdentityContext context)
Called to determine what keycloak username and email to use to process the login request from the external IDP.
|
void |
AbstractIdentityProviderMapper.preprocessFederatedIdentity(KeycloakSession session,
RealmModel realm,
IdentityProviderMapperModel mapperModel,
BrokeredIdentityContext context) |
void |
IdentityProvider.updateBrokeredUser(KeycloakSession session,
RealmModel realm,
UserModel user,
BrokeredIdentityContext context) |
void |
AbstractIdentityProvider.updateBrokeredUser(KeycloakSession session,
RealmModel realm,
UserModel user,
BrokeredIdentityContext context) |
void |
HardcodedUserSessionAttributeMapper.updateBrokeredUser(KeycloakSession session,
RealmModel realm,
UserModel user,
IdentityProviderMapperModel mapperModel,
BrokeredIdentityContext context) |
void |
HardcodedRoleMapper.updateBrokeredUser(KeycloakSession session,
RealmModel realm,
UserModel user,
IdentityProviderMapperModel mapperModel,
BrokeredIdentityContext context) |
void |
HardcodedAttributeMapper.updateBrokeredUser(KeycloakSession session,
RealmModel realm,
UserModel user,
IdentityProviderMapperModel mapperModel,
BrokeredIdentityContext context) |
void |
IdentityProviderMapper.updateBrokeredUser(KeycloakSession session,
RealmModel realm,
UserModel user,
IdentityProviderMapperModel mapperModel,
BrokeredIdentityContext context)
Called when this user has logged in before and has already been imported.
|
void |
AbstractIdentityProviderMapper.updateBrokeredUser(KeycloakSession session,
RealmModel realm,
UserModel user,
IdentityProviderMapperModel mapperModel,
BrokeredIdentityContext context) |
void |
HardcodedRoleMapper.updateBrokeredUserLegacy(KeycloakSession session,
RealmModel realm,
UserModel user,
IdentityProviderMapperModel mapperModel,
BrokeredIdentityContext context) |
void |
IdentityProviderMapper.updateBrokeredUserLegacy(KeycloakSession session,
RealmModel realm,
UserModel user,
IdentityProviderMapperModel mapperModel,
BrokeredIdentityContext context)
Called when this user has logged in before and has already been imported.
|
void |
AbstractIdentityProviderMapper.updateBrokeredUserLegacy(KeycloakSession session,
RealmModel realm,
UserModel user,
IdentityProviderMapperModel mapperModel,
BrokeredIdentityContext context) |
Constructor and Description |
---|
AuthenticationRequest(KeycloakSession session,
RealmModel realm,
AuthenticationSessionModel authSession,
org.jboss.resteasy.spi.HttpRequest httpRequest,
javax.ws.rs.core.UriInfo uriInfo,
IdentityBrokerState state,
String redirectUri) |
Modifier and Type | Field and Description |
---|---|
protected RealmModel |
SAMLEndpoint.realm |
Modifier and Type | Method and Description |
---|---|
void |
SAMLIdentityProvider.backchannelLogout(KeycloakSession session,
UserSessionModel userSession,
javax.ws.rs.core.UriInfo uriInfo,
RealmModel realm) |
protected LogoutRequestType |
SAMLIdentityProvider.buildLogoutRequest(UserSessionModel userSession,
javax.ws.rs.core.UriInfo uriInfo,
RealmModel realm,
String singleLogoutServiceUrl,
SamlProtocolExtensionsAwareBuilder.NodeGenerator... extensions) |
Object |
SAMLIdentityProvider.callback(RealmModel realm,
IdentityProvider.AuthenticationCallback callback,
EventBuilder event) |
javax.ws.rs.core.Response |
SAMLIdentityProvider.export(javax.ws.rs.core.UriInfo uriInfo,
RealmModel realm,
String format) |
javax.ws.rs.core.Response |
SAMLIdentityProvider.keycloakInitiatedBrowserLogout(KeycloakSession session,
UserSessionModel userSession,
javax.ws.rs.core.UriInfo uriInfo,
RealmModel realm) |
void |
SAMLIdentityProviderConfig.validate(RealmModel realm) |
Constructor and Description |
---|
SAMLEndpoint(RealmModel realm,
SAMLIdentityProvider provider,
SAMLIdentityProviderConfig config,
IdentityProvider.AuthenticationCallback callback,
DestinationValidator destinationValidator) |
Modifier and Type | Method and Description |
---|---|
default List<ProviderConfigProperty> |
SubComponentFactory.getConfigProperties(RealmModel realm,
ComponentModel parent) |
default Map<String,Object> |
SubComponentFactory.getTypeMetadata(RealmModel realm,
ComponentModel parent)
This is metadata about this component type.
|
default void |
ComponentFactory.onCreate(KeycloakSession session,
RealmModel realm,
ComponentModel model)
Called after a component is created
|
default void |
ComponentFactory.onUpdate(KeycloakSession session,
RealmModel realm,
ComponentModel oldModel,
ComponentModel newModel)
Called after the component is updated.
|
default void |
ComponentFactory.preRemove(KeycloakSession session,
RealmModel realm,
ComponentModel model)
Called before the component is removed.
|
default void |
ComponentFactory.validateConfiguration(KeycloakSession session,
RealmModel realm,
ComponentModel model)
Called before a component is created or updated.
|
Modifier and Type | Method and Description |
---|---|
CredentialValidationOutput |
UserCredentialStoreManager.authenticate(KeycloakSession session,
RealmModel realm,
CredentialInput input) |
CredentialValidationOutput |
CredentialAuthentication.authenticate(RealmModel realm,
CredentialInput input) |
CredentialModel |
UserCredentialStoreManager.createCredential(RealmModel realm,
UserModel user,
CredentialModel cred) |
CredentialModel |
UserCredentialStore.createCredential(RealmModel realm,
UserModel user,
CredentialModel cred) |
CredentialModel |
OTPCredentialProvider.createCredential(RealmModel realm,
UserModel user,
OTPCredentialModel credentialModel) |
CredentialModel |
PasswordCredentialProvider.createCredential(RealmModel realm,
UserModel user,
PasswordCredentialModel credentialModel) |
boolean |
PasswordCredentialProvider.createCredential(RealmModel realm,
UserModel user,
String password) |
CredentialModel |
CredentialProvider.createCredential(RealmModel realm,
UserModel user,
T credentialModel) |
CredentialModel |
WebAuthnCredentialProvider.createCredential(RealmModel realm,
UserModel user,
WebAuthnCredentialModel credentialModel) |
CredentialModel |
UserCredentialStoreManager.createCredentialThroughProvider(RealmModel realm,
UserModel user,
CredentialModel model) |
boolean |
WebAuthnCredentialProvider.deleteCredential(RealmModel realm,
UserModel user,
String credentialId) |
boolean |
PasswordCredentialProvider.deleteCredential(RealmModel realm,
UserModel user,
String credentialId) |
boolean |
OTPCredentialProvider.deleteCredential(RealmModel realm,
UserModel user,
String credentialId) |
boolean |
CredentialProvider.deleteCredential(RealmModel realm,
UserModel user,
String credentialId) |
void |
UserCredentialStoreManager.disableCredentialType(RealmModel realm,
UserModel user,
String credentialType) |
void |
PasswordCredentialProvider.disableCredentialType(RealmModel realm,
UserModel user,
String credentialType) |
void |
CredentialInputUpdater.disableCredentialType(RealmModel realm,
UserModel user,
String credentialType) |
List<String> |
UserCredentialStoreManager.getConfiguredUserStorageCredentialTypes(RealmModel realm,
UserModel user) |
static <T> List<T> |
UserCredentialStoreManager.getCredentialProviders(KeycloakSession session,
RealmModel realm,
Class<T> type) |
default T |
CredentialProvider.getDefaultCredential(KeycloakSession session,
RealmModel realm,
UserModel user) |
Set<String> |
UserCredentialStoreManager.getDisableableCredentialTypes(RealmModel realm,
UserModel user) |
Set<String> |
PasswordCredentialProvider.getDisableableCredentialTypes(RealmModel realm,
UserModel user) |
Set<String> |
CredentialInputUpdater.getDisableableCredentialTypes(RealmModel realm,
UserModel user)
Returns a set of credential types that can be disabled by disableCredentialType() method
|
PasswordCredentialModel |
PasswordCredentialProvider.getPassword(RealmModel realm,
UserModel user) |
CredentialModel |
UserCredentialStoreManager.getStoredCredentialById(RealmModel realm,
UserModel user,
String id) |
CredentialModel |
UserCredentialStore.getStoredCredentialById(RealmModel realm,
UserModel user,
String id) |
CredentialModel |
UserCredentialStoreManager.getStoredCredentialByNameAndType(RealmModel realm,
UserModel user,
String name,
String type) |
CredentialModel |
UserCredentialStore.getStoredCredentialByNameAndType(RealmModel realm,
UserModel user,
String name,
String type) |
List<CredentialModel> |
UserCredentialStoreManager.getStoredCredentials(RealmModel realm,
UserModel user) |
List<CredentialModel> |
UserCredentialStore.getStoredCredentials(RealmModel realm,
UserModel user) |
List<CredentialModel> |
UserCredentialStoreManager.getStoredCredentialsByType(RealmModel realm,
UserModel user,
String type) |
List<CredentialModel> |
UserCredentialStore.getStoredCredentialsByType(RealmModel realm,
UserModel user,
String type) |
boolean |
OTPCredentialProvider.isConfiguredFor(RealmModel realm,
UserModel user) |
boolean |
WebAuthnCredentialProvider.isConfiguredFor(RealmModel realm,
UserModel user,
String credentialType) |
boolean |
UserCredentialStoreManager.isConfiguredFor(RealmModel realm,
UserModel user,
String type) |
boolean |
PasswordCredentialProvider.isConfiguredFor(RealmModel realm,
UserModel user,
String credentialType) |
boolean |
OTPCredentialProvider.isConfiguredFor(RealmModel realm,
UserModel user,
String credentialType) |
boolean |
CredentialInputValidator.isConfiguredFor(RealmModel realm,
UserModel user,
String credentialType) |
boolean |
UserCredentialStoreManager.isConfiguredLocally(RealmModel realm,
UserModel user,
String type) |
boolean |
UserCredentialStoreManager.isValid(RealmModel realm,
UserModel user,
CredentialInput... inputs) |
boolean |
WebAuthnCredentialProvider.isValid(RealmModel realm,
UserModel user,
CredentialInput input) |
boolean |
PasswordCredentialProvider.isValid(RealmModel realm,
UserModel user,
CredentialInput input) |
boolean |
OTPCredentialProvider.isValid(RealmModel realm,
UserModel user,
CredentialInput credentialInput) |
boolean |
CredentialInputValidator.isValid(RealmModel realm,
UserModel user,
CredentialInput credentialInput)
Tests whether a credential is valid
|
boolean |
UserCredentialStoreManager.isValid(RealmModel realm,
UserModel user,
List<CredentialInput> inputs) |
boolean |
UserCredentialStoreManager.moveCredentialTo(RealmModel realm,
UserModel user,
String id,
String newPreviousCredentialId) |
boolean |
UserCredentialStore.moveCredentialTo(RealmModel realm,
UserModel user,
String id,
String newPreviousCredentialId) |
void |
UserCredentialStoreManager.onCache(RealmModel realm,
CachedUserModel user,
UserModel delegate) |
void |
PasswordCredentialProvider.onCache(RealmModel realm,
CachedUserModel user,
UserModel delegate) |
boolean |
UserCredentialStoreManager.removeStoredCredential(RealmModel realm,
UserModel user,
String id) |
boolean |
UserCredentialStore.removeStoredCredential(RealmModel realm,
UserModel user,
String id) |
boolean |
UserCredentialStoreManager.updateCredential(RealmModel realm,
UserModel user,
CredentialInput input) |
boolean |
PasswordCredentialProvider.updateCredential(RealmModel realm,
UserModel user,
CredentialInput input) |
boolean |
CredentialInputUpdater.updateCredential(RealmModel realm,
UserModel user,
CredentialInput input) |
void |
UserCredentialStoreManager.updateCredential(RealmModel realm,
UserModel user,
CredentialModel cred) |
void |
UserCredentialStore.updateCredential(RealmModel realm,
UserModel user,
CredentialModel cred) |
void |
UserCredentialStoreManager.updateCredentialLabel(RealmModel realm,
UserModel user,
String credentialId,
String userLabel) |
Modifier and Type | Method and Description |
---|---|
EmailTemplateProvider |
EmailTemplateProvider.setRealm(RealmModel realm) |
Modifier and Type | Field and Description |
---|---|
protected RealmModel |
FreeMarkerEmailTemplateProvider.realm |
Modifier and Type | Method and Description |
---|---|
EmailTemplateProvider |
FreeMarkerEmailTemplateProvider.setRealm(RealmModel realm) |
Modifier and Type | Method and Description |
---|---|
EventBuilder |
EventBuilder.realm(RealmModel realm) |
Constructor and Description |
---|
EventBuilder(RealmModel realm,
KeycloakSession session,
ClientConnection clientConnection) |
Modifier and Type | Method and Description |
---|---|
protected void |
DirExportProvider.writeFederatedUsers(String fileName,
KeycloakSession session,
RealmModel realm,
List<String> users) |
protected void |
DirExportProvider.writeUsers(String fileName,
KeycloakSession session,
RealmModel realm,
List<UserModel> users) |
Modifier and Type | Method and Description |
---|---|
static MultivaluedHashMap<String,ComponentExportRepresentation> |
ExportUtils.exportComponents(RealmModel realm,
String parentId) |
static UserRepresentation |
ExportUtils.exportFederatedUser(KeycloakSession session,
RealmModel realm,
String id,
ExportOptions options)
Full export of user data stored in federated storage (including role mappings and credentials)
|
static void |
ExportUtils.exportFederatedUsersToStream(KeycloakSession session,
RealmModel realm,
List<String> usersToExport,
com.fasterxml.jackson.databind.ObjectMapper mapper,
OutputStream os) |
static void |
ExportUtils.exportFederatedUsersToStream(KeycloakSession session,
RealmModel realm,
List<String> usersToExport,
com.fasterxml.jackson.databind.ObjectMapper mapper,
OutputStream os,
ExportOptions options) |
static RealmRepresentation |
ExportUtils.exportRealm(KeycloakSession session,
RealmModel realm,
boolean includeUsers,
boolean internal) |
static RealmRepresentation |
ExportUtils.exportRealm(KeycloakSession session,
RealmModel realm,
ExportOptions options,
boolean internal) |
static UserRepresentation |
ExportUtils.exportUser(KeycloakSession session,
RealmModel realm,
UserModel user,
ExportOptions options,
boolean internal)
Full export of user (including role mappings and credentials)
|
static void |
ExportUtils.exportUsersToStream(KeycloakSession session,
RealmModel realm,
List<UserModel> usersToExport,
com.fasterxml.jackson.databind.ObjectMapper mapper,
OutputStream os) |
static void |
ExportUtils.exportUsersToStream(KeycloakSession session,
RealmModel realm,
List<UserModel> usersToExport,
com.fasterxml.jackson.databind.ObjectMapper mapper,
OutputStream os,
ExportOptions options) |
protected abstract void |
MultipleStepsExportProvider.writeFederatedUsers(String fileName,
KeycloakSession session,
RealmModel realm,
List<String> users) |
protected abstract void |
MultipleStepsExportProvider.writeUsers(String fileName,
KeycloakSession session,
RealmModel realm,
List<UserModel> users) |
Modifier and Type | Method and Description |
---|---|
CredentialValidationOutput |
KerberosFederationProvider.authenticate(RealmModel realm,
CredentialInput input) |
void |
KerberosFederationProvider.disableCredentialType(RealmModel realm,
UserModel user,
String credentialType) |
protected UserModel |
KerberosFederationProvider.findOrCreateAuthenticatedUser(RealmModel realm,
String username)
Called after successful authentication
|
Set<String> |
KerberosFederationProvider.getDisableableCredentialTypes(RealmModel realm,
UserModel user) |
UserModel |
KerberosFederationProvider.getUserByEmail(String email,
RealmModel realm) |
UserModel |
KerberosFederationProvider.getUserById(String id,
RealmModel realm) |
UserModel |
KerberosFederationProvider.getUserByUsername(String username,
RealmModel realm) |
protected UserModel |
KerberosFederationProvider.importUserToKeycloak(RealmModel realm,
String username) |
boolean |
KerberosFederationProvider.isConfiguredFor(RealmModel realm,
UserModel user,
String credentialType) |
boolean |
KerberosFederationProvider.isValid(RealmModel realm,
UserModel local) |
boolean |
KerberosFederationProvider.isValid(RealmModel realm,
UserModel user,
CredentialInput input) |
void |
KerberosFederationProviderFactory.onCreate(KeycloakSession session,
RealmModel realm,
ComponentModel model) |
void |
KerberosFederationProviderFactory.onUpdate(KeycloakSession session,
RealmModel realm,
ComponentModel oldModel,
ComponentModel newModel) |
void |
KerberosFederationProviderFactory.preRemove(KeycloakSession session,
RealmModel realm,
ComponentModel model) |
void |
KerberosFederationProvider.preRemove(RealmModel realm) |
void |
KerberosFederationProvider.preRemove(RealmModel realm,
GroupModel group) |
void |
KerberosFederationProvider.preRemove(RealmModel realm,
RoleModel role) |
boolean |
KerberosFederationProvider.updateCredential(RealmModel realm,
UserModel user,
CredentialInput input) |
UserModel |
KerberosFederationProvider.validate(RealmModel realm,
UserModel user) |
Modifier and Type | Method and Description |
---|---|
void |
SSSDFederationProvider.disableCredentialType(RealmModel realm,
UserModel user,
String credentialType) |
protected UserModel |
SSSDFederationProvider.findOrCreateAuthenticatedUser(RealmModel realm,
String username)
Called after successful authentication
|
Set<String> |
SSSDFederationProvider.getDisableableCredentialTypes(RealmModel realm,
UserModel user) |
UserModel |
SSSDFederationProvider.getUserByEmail(String email,
RealmModel realm) |
UserModel |
SSSDFederationProvider.getUserById(String id,
RealmModel realm) |
UserModel |
SSSDFederationProvider.getUserByUsername(String username,
RealmModel realm) |
protected UserModel |
SSSDFederationProvider.importUserToKeycloak(RealmModel realm,
String username) |
boolean |
SSSDFederationProvider.isConfiguredFor(RealmModel realm,
UserModel user,
String credentialType) |
boolean |
SSSDFederationProvider.isValid(RealmModel realm,
UserModel local) |
boolean |
SSSDFederationProvider.isValid(RealmModel realm,
UserModel user,
CredentialInput input) |
void |
SSSDFederationProvider.preRemove(RealmModel realm) |
void |
SSSDFederationProvider.preRemove(RealmModel realm,
GroupModel group) |
void |
SSSDFederationProvider.preRemove(RealmModel realm,
RoleModel role) |
boolean |
SSSDFederationProvider.updateCredential(RealmModel realm,
UserModel user,
CredentialInput input) |
UserModel |
SSSDFederationProvider.validate(RealmModel realm,
UserModel user) |
UserModel |
SSSDFederationProvider.validateAndProxy(RealmModel realm,
UserModel local) |
Modifier and Type | Method and Description |
---|---|
AccountProvider |
AccountProvider.setRealm(RealmModel realm) |
Modifier and Type | Field and Description |
---|---|
protected RealmModel |
FreeMarkerAccountProvider.realm |
Modifier and Type | Method and Description |
---|---|
AccountProvider |
FreeMarkerAccountProvider.setRealm(RealmModel realm) |
Constructor and Description |
---|
AccountFederatedIdentityBean(KeycloakSession session,
RealmModel realm,
UserModel user,
URI baseUri,
String stateChecker) |
ApplicationsBean(KeycloakSession session,
RealmModel realm,
UserModel user) |
RealmBean(RealmModel realmModel) |
SessionsBean(RealmModel realm,
List<UserSessionModel> sessions) |
TotpBean(KeycloakSession session,
RealmModel realm,
UserModel user,
javax.ws.rs.core.UriBuilder uriBuilder) |
UrlBean(RealmModel realm,
Theme theme,
URI baseURI,
URI baseQueryURI,
URI currentURI,
String stateChecker) |
UserSessionBean(RealmModel realm,
UserSessionModel session) |
Modifier and Type | Field and Description |
---|---|
protected RealmModel |
FreeMarkerLoginFormsProvider.realm |
Modifier and Type | Method and Description |
---|---|
static List<IdentityProviderModel> |
LoginFormsUtil.filterIdentityProviders(List<IdentityProviderModel> providers,
KeycloakSession session,
RealmModel realm,
Map<String,Object> attributes,
javax.ws.rs.core.MultivaluedMap<String,String> formData,
AuthenticationFlowContext context) |
static List<IdentityProviderModel> |
LoginFormsUtil.filterIdentityProvidersByUser(List<IdentityProviderModel> providers,
KeycloakSession session,
RealmModel realm,
Map<String,Object> attributes,
javax.ws.rs.core.MultivaluedMap<String,String> formData) |
Constructor and Description |
---|
AuthenticatorConfiguredMethod(RealmModel realm,
UserModel user,
KeycloakSession session) |
Constructor and Description |
---|
IdentityProviderBean(RealmModel realm,
KeycloakSession session,
List<IdentityProviderModel> identityProviders,
URI baseURI) |
RealmBean(RealmModel realmModel) |
RequiredActionUrlFormatterMethod(RealmModel realm,
URI baseUri) |
TotpBean(KeycloakSession session,
RealmModel realm,
UserModel user,
javax.ws.rs.core.UriBuilder uriBuilder) |
TotpLoginBean(KeycloakSession session,
RealmModel realm,
UserModel user,
String selectedCredentialId) |
UrlBean(RealmModel realm,
Theme theme,
URI baseURI,
URI actionUri) |
WebAuthnAuthenticatorsBean(KeycloakSession session,
RealmModel realm,
UserModel user,
String credentialType) |
Modifier and Type | Method and Description |
---|---|
KeyManager.ActiveAesKey |
DefaultKeyManager.getActiveAesKey(RealmModel realm)
Deprecated.
|
KeyManager.ActiveHmacKey |
DefaultKeyManager.getActiveHmacKey(RealmModel realm)
Deprecated.
|
KeyWrapper |
DefaultKeyManager.getActiveKey(RealmModel realm,
KeyUse use,
String algorithm) |
KeyManager.ActiveRsaKey |
DefaultKeyManager.getActiveRsaKey(RealmModel realm)
Deprecated.
|
List<SecretKeyMetadata> |
DefaultKeyManager.getAesKeys(RealmModel realm) |
SecretKey |
DefaultKeyManager.getAesSecretKey(RealmModel realm,
String kid)
Deprecated.
|
List<SecretKeyMetadata> |
DefaultKeyManager.getHmacKeys(RealmModel realm) |
SecretKey |
DefaultKeyManager.getHmacSecretKey(RealmModel realm,
String kid)
Deprecated.
|
KeyWrapper |
DefaultKeyManager.getKey(RealmModel realm,
String kid,
KeyUse use,
String algorithm) |
List<KeyWrapper> |
DefaultKeyManager.getKeys(RealmModel realm) |
List<KeyWrapper> |
DefaultKeyManager.getKeys(RealmModel realm,
KeyUse use,
String algorithm) |
Certificate |
DefaultKeyManager.getRsaCertificate(RealmModel realm,
String kid)
Deprecated.
|
List<RsaKeyMetadata> |
DefaultKeyManager.getRsaKeys(RealmModel realm)
Deprecated.
|
PublicKey |
DefaultKeyManager.getRsaPublicKey(RealmModel realm,
String kid)
Deprecated.
|
protected KeyWrapper |
JavaKeystoreKeyProvider.loadKey(RealmModel realm,
ComponentModel model) |
KeyWrapper |
ImportedRsaKeyProvider.loadKey(RealmModel realm,
ComponentModel model) |
protected KeyWrapper |
GeneratedEcdsaKeyProvider.loadKey(RealmModel realm,
ComponentModel model) |
protected abstract KeyWrapper |
AbstractRsaKeyProvider.loadKey(RealmModel realm,
ComponentModel model) |
protected abstract KeyWrapper |
AbstractEcdsaKeyProvider.loadKey(RealmModel realm,
ComponentModel model) |
void |
JavaKeystoreKeyProviderFactory.validateConfiguration(KeycloakSession session,
RealmModel realm,
ComponentModel model) |
void |
ImportedRsaKeyProviderFactory.validateConfiguration(KeycloakSession session,
RealmModel realm,
ComponentModel model) |
void |
GeneratedRsaKeyProviderFactory.validateConfiguration(KeycloakSession session,
RealmModel realm,
ComponentModel model) |
void |
GeneratedEcdsaKeyProviderFactory.validateConfiguration(KeycloakSession session,
RealmModel realm,
ComponentModel model) |
void |
AbstractRsaKeyProviderFactory.validateConfiguration(KeycloakSession session,
RealmModel realm,
ComponentModel model) |
void |
AbstractGeneratedSecretKeyProviderFactory.validateConfiguration(KeycloakSession session,
RealmModel realm,
ComponentModel model) |
void |
AbstractEcdsaKeyProviderFactory.validateConfiguration(KeycloakSession session,
RealmModel realm,
ComponentModel model) |
Constructor and Description |
---|
AbstractEcdsaKeyProvider(RealmModel realm,
ComponentModel model) |
AbstractRsaKeyProvider(RealmModel realm,
ComponentModel model) |
GeneratedEcdsaKeyProvider(RealmModel realm,
ComponentModel model) |
ImportedRsaKeyProvider(RealmModel realm,
ComponentModel model) |
JavaKeystoreKeyProvider(RealmModel realm,
ComponentModel model) |
Modifier and Type | Method and Description |
---|---|
static PublicKey |
PublicKeyStorageManager.getIdentityProviderPublicKey(KeycloakSession session,
RealmModel realm,
OIDCIdentityProviderConfig idpConfig,
JWSInput input) |
Modifier and Type | Method and Description |
---|---|
Locale |
DefaultLocaleSelectorProvider.resolveLocale(RealmModel realm,
UserModel user) |
Locale |
LocaleSelectorProvider.resolveLocale(RealmModel realm,
UserModel user)
Resolve the locale which should be used for the request
|
Modifier and Type | Method and Description |
---|---|
ClientScopeModel |
MigrationProvider.addOIDCMicroprofileJWTClientScope(RealmModel realm)
Adds the
microprofile-jwt optional client scope to the realm and returns the created scope. |
ClientScopeModel |
MigrationProvider.addOIDCRolesClientScope(RealmModel realm)
Add 'roles' client scope or return it if already exists
|
ClientScopeModel |
MigrationProvider.addOIDCWebOriginsClientScope(RealmModel realm)
Add 'web-origins' client scope or return it if already exists
|
static void |
MigrationModelManager.migrateImport(KeycloakSession session,
RealmModel realm,
RealmRepresentation rep,
boolean skipUserDependent) |
void |
MigrationProvider.setupAdminCli(RealmModel realm) |
Modifier and Type | Method and Description |
---|---|
protected void |
MigrateTo9_0_0.addAccountConsoleClient(RealmModel realm) |
static void |
MigrationUtils.addAdminRole(RealmModel realm,
String roleName) |
protected void |
MigrateTo9_0_4.checkAuthConfigNullAlias(RealmModel realm) |
static ComponentModel |
MigrateTo1_8_0.getMapperByName(RealmModel realm,
ComponentModel providerModel,
String name) |
protected void |
MigrateTo8_0_2.migrateAuthenticationFlowsWithAlternativeRequirements(RealmModel realm) |
default void |
Migration.migrateImport(KeycloakSession session,
RealmModel realm,
RealmRepresentation rep,
boolean skipUserDependent)
Called after full import of representation.
|
void |
MigrateTo9_0_4.migrateImport(KeycloakSession session,
RealmModel realm,
RealmRepresentation rep,
boolean skipUserDependent) |
void |
MigrateTo9_0_0.migrateImport(KeycloakSession session,
RealmModel realm,
RealmRepresentation rep,
boolean skipUserDependent) |
void |
MigrateTo8_0_2.migrateImport(KeycloakSession session,
RealmModel realm,
RealmRepresentation rep,
boolean skipUserDependent) |
void |
MigrateTo8_0_0.migrateImport(KeycloakSession session,
RealmModel realm,
RealmRepresentation rep,
boolean skipUserDependent) |
void |
MigrateTo6_0_0.migrateImport(KeycloakSession session,
RealmModel realm,
RealmRepresentation rep,
boolean skipUserDependent) |
void |
MigrateTo4_6_0.migrateImport(KeycloakSession session,
RealmModel realm,
RealmRepresentation rep,
boolean skipUserDependent) |
void |
MigrateTo4_2_0.migrateImport(KeycloakSession session,
RealmModel realm,
RealmRepresentation rep,
boolean skipUserDependent) |
void |
MigrateTo4_0_0.migrateImport(KeycloakSession session,
RealmModel realm,
RealmRepresentation rep,
boolean skipUserDependent) |
void |
MigrateTo3_4_2.migrateImport(KeycloakSession session,
RealmModel realm,
RealmRepresentation rep,
boolean skipUserDependent) |
void |
MigrateTo3_4_1.migrateImport(KeycloakSession session,
RealmModel realm,
RealmRepresentation rep,
boolean skipUserDependent) |
void |
MigrateTo3_4_0.migrateImport(KeycloakSession session,
RealmModel realm,
RealmRepresentation rep,
boolean skipUserDependent) |
void |
MigrateTo3_2_0.migrateImport(KeycloakSession session,
RealmModel realm,
RealmRepresentation rep,
boolean skipUserDependent) |
void |
MigrateTo3_1_0.migrateImport(KeycloakSession session,
RealmModel realm,
RealmRepresentation rep,
boolean skipUserDependent) |
void |
MigrateTo3_0_0.migrateImport(KeycloakSession session,
RealmModel realm,
RealmRepresentation rep,
boolean skipUserDependent) |
void |
MigrateTo2_5_0.migrateImport(KeycloakSession session,
RealmModel realm,
RealmRepresentation rep,
boolean skipUserDependent) |
void |
MigrateTo2_3_0.migrateImport(KeycloakSession session,
RealmModel realm,
RealmRepresentation rep,
boolean skipUserDependent) |
void |
MigrateTo2_2_0.migrateImport(KeycloakSession session,
RealmModel realm,
RealmRepresentation rep,
boolean skipUserDependent) |
void |
MigrateTo2_1_0.migrateImport(KeycloakSession session,
RealmModel realm,
RealmRepresentation rep,
boolean skipUserDependent) |
void |
MigrateTo2_0_0.migrateImport(KeycloakSession session,
RealmModel realm,
RealmRepresentation rep,
boolean skipUserDependent) |
void |
MigrateTo1_9_2.migrateImport(KeycloakSession session,
RealmModel realm,
RealmRepresentation rep,
boolean skipUserDependent) |
void |
MigrateTo1_8_0.migrateImport(KeycloakSession session,
RealmModel realm,
RealmRepresentation rep,
boolean skipUserDependent) |
void |
MigrateTo1_7_0.migrateImport(KeycloakSession session,
RealmModel realm,
RealmRepresentation rep,
boolean skipUserDependent) |
void |
MigrateTo1_6_0.migrateImport(KeycloakSession session,
RealmModel realm,
RealmRepresentation rep,
boolean skipUserDependent) |
void |
MigrateTo1_5_0.migrateImport(KeycloakSession session,
RealmModel realm,
RealmRepresentation rep,
boolean skipUserDependent) |
void |
MigrateTo1_4_0.migrateImport(KeycloakSession session,
RealmModel realm,
RealmRepresentation rep,
boolean skipUserDependent) |
void |
MigrateTo1_3_0.migrateImport(KeycloakSession session,
RealmModel realm,
RealmRepresentation rep,
boolean skipUserDependent) |
void |
MigrateTo1_2_0.migrateImport(KeycloakSession session,
RealmModel realm,
RealmRepresentation rep,
boolean skipUserDependent) |
static void |
MigrationUtils.migrateOldOfflineToken(KeycloakSession session,
RealmModel realm,
ClientModel client,
UserModel user) |
static void |
MigrateTo8_0_0.migrateOptionalAuthenticationExecution(RealmModel realm,
AuthenticationFlowModel parentFlow,
AuthenticationExecutionModel optionalExecution,
boolean updateOptionalExecution) |
protected void |
MigrateTo1_6_0.migrateRealm(KeycloakSession session,
ProtocolMapperModel localeMapper,
RealmModel realm) |
protected void |
MigrateTo3_2_0.migrateRealm(KeycloakSession session,
RealmModel realm) |
protected void |
MigrateTo1_7_0.migrateRealm(KeycloakSession session,
RealmModel realm) |
protected void |
MigrateTo1_4_0.migrateRealm(KeycloakSession session,
RealmModel realm) |
protected void |
MigrateTo6_0_0.migrateRealm(KeycloakSession session,
RealmModel realm,
boolean jsn) |
protected void |
MigrateTo4_6_0.migrateRealm(KeycloakSession session,
RealmModel realm,
boolean json) |
protected void |
MigrateTo4_2_0.migrateRealm(KeycloakSession session,
RealmModel realm,
boolean json) |
protected void |
MigrateTo4_0_0.migrateRealm(KeycloakSession session,
RealmModel realm,
boolean json) |
protected void |
MigrateTo3_4_2.migrateRealm(RealmModel realm) |
protected void |
MigrateTo3_4_1.migrateRealm(RealmModel r) |
protected void |
MigrateTo3_4_0.migrateRealm(RealmModel r) |
protected void |
MigrateTo3_1_0.migrateRealm(RealmModel realm) |
protected void |
MigrateTo3_0_0.migrateRealm(RealmModel realm) |
protected void |
MigrateTo2_3_0.migrateRealm(RealmModel realm) |
protected void |
MigrateTo1_9_2.migrateRealm(RealmModel realm) |
protected void |
MigrateTo1_8_0.migrateRealm(RealmModel realm) |
protected void |
MigrateTo1_5_0.migrateRealm(RealmModel realm) |
protected void |
MigrateTo9_0_0.migrateRealmCommon(RealmModel realm) |
protected void |
MigrateTo8_0_0.migrateRealmCommon(RealmModel realm) |
protected void |
MigrateTo8_0_0.migrateRealmMFA(KeycloakSession session,
RealmModel realm,
boolean jsn) |
void |
MigrateTo1_2_0.setupBrokerService(RealmModel realm) |
Modifier and Type | Method and Description |
---|---|
RealmModel |
RealmProvider.createRealm(String name) |
RealmModel |
RealmProvider.createRealm(String id,
String name) |
RealmModel |
RealmModel.RealmCreationEvent.getCreatedRealm() |
RealmModel |
RealmModel.RealmPostCreateEvent.getCreatedRealm() |
RealmModel |
UserSessionModel.getRealm() |
RealmModel |
UserModel.UserRemovedEvent.getRealm() |
RealmModel |
RealmModel.RealmRemovedEvent.getRealm() |
RealmModel |
RealmModel.IdentityProviderUpdatedEvent.getRealm() |
RealmModel |
RealmModel.IdentityProviderRemovedEvent.getRealm() |
RealmModel |
KeycloakContext.getRealm() |
RealmModel |
GroupModel.GroupRemovedEvent.getRealm() |
RealmModel |
ClientScopeModel.getRealm() |
RealmModel |
ClientModel.getRealm() |
RealmModel |
RealmProvider.getRealm(String id) |
RealmModel |
RealmProvider.getRealmByName(String name) |
Modifier and Type | Method and Description |
---|---|
List<RealmModel> |
RealmProvider.getRealms() |
List<RealmModel> |
RealmProvider.getRealmsWithProviderType(Class<?> type) |
Modifier and Type | Method and Description |
---|---|
default ClientModel |
RealmProvider.addClient(RealmModel realm,
String clientId)
Deprecated.
Use the corresponding method from
ClientProvider . |
default ClientModel |
ClientProvider.addClient(RealmModel realm,
String clientId)
Adds a client with given
clientId to the given realm. |
ClientModel |
RealmProvider.addClient(RealmModel realm,
String id,
String clientId)
Deprecated.
Use the corresponding method from
ClientProvider . |
ClientModel |
ClientProvider.addClient(RealmModel realm,
String id,
String clientId)
Adds a client with given internal ID and
clientId to the given realm. |
RoleModel |
RealmProvider.addClientRole(RealmModel realm,
ClientModel client,
String name)
TODO: To be @deprecated Use the corresponding method from
??RoleProvider . |
RoleModel |
RealmProvider.addClientRole(RealmModel realm,
ClientModel client,
String id,
String name)
TODO: To be @deprecated Use the corresponding method from
??RoleProvider . |
void |
UserProvider.addConsent(RealmModel realm,
String userId,
UserConsentModel consent) |
void |
UserProvider.addFederatedIdentity(RealmModel realm,
UserModel user,
FederatedIdentityModel socialLink) |
RoleModel |
RealmProvider.addRealmRole(RealmModel realm,
String name) |
RoleModel |
RealmProvider.addRealmRole(RealmModel realm,
String id,
String name) |
void |
RealmProvider.addTopLevelGroup(RealmModel realm,
GroupModel subGroup) |
UserModel |
UserProvider.addUser(RealmModel realm,
String id,
String username,
boolean addDefaultRoles,
boolean addDefaultRequiredActions)
only used for local storage
|
UserLoginFailureModel |
UserSessionProvider.addUserLoginFailure(RealmModel realm,
String userId) |
CredentialValidationOutput |
UserCredentialManager.authenticate(KeycloakSession session,
RealmModel realm,
CredentialInput input)
Given a CredentialInput, authenticate the user.
|
ClientInitialAccessModel |
RealmProvider.createClientInitialAccessModel(RealmModel realm,
int expiration,
int count) |
AuthenticatedClientSessionModel |
UserSessionProvider.createClientSession(RealmModel realm,
ClientModel client,
UserSessionModel userSession) |
CredentialModel |
UserCredentialManager.createCredentialThroughProvider(RealmModel realm,
UserModel user,
CredentialModel model)
Creates a credential from the credentialModel, by looping through the providers to find a match for the type
|
default GroupModel |
RealmProvider.createGroup(RealmModel realm,
String name) |
default GroupModel |
RealmProvider.createGroup(RealmModel realm,
String name,
GroupModel toParent) |
default GroupModel |
RealmProvider.createGroup(RealmModel realm,
String id,
String name) |
GroupModel |
RealmProvider.createGroup(RealmModel realm,
String id,
String name,
GroupModel toParent) |
UserSessionModel |
UserSessionProvider.createUserSession(RealmModel realm,
UserModel user,
String loginUsername,
String ipAddress,
String authMethod,
boolean rememberMe,
String brokerSessionId,
String brokerUserId) |
UserSessionModel |
UserSessionProvider.createUserSession(String id,
RealmModel realm,
UserModel user,
String loginUsername,
String ipAddress,
String authMethod,
boolean rememberMe,
String brokerSessionId,
String brokerUserId) |
void |
RealmProvider.decreaseRemainingCount(RealmModel realm,
ClientInitialAccessModel clientInitialAccess) |
void |
UserCredentialManager.disableCredentialType(RealmModel realm,
UserModel user,
String credentialType)
Calls disableCredential on UserStorageProvider and UserFederationProviders first, then loop through
each CredentialProvider.
|
KeyManager.ActiveAesKey |
KeyManager.getActiveAesKey(RealmModel realm)
Deprecated.
|
Map<String,Long> |
UserSessionProvider.getActiveClientSessionStats(RealmModel realm,
boolean offline)
Returns a summary of client sessions key is client.getId()
|
KeyManager.ActiveHmacKey |
KeyManager.getActiveHmacKey(RealmModel realm)
Deprecated.
|
KeyWrapper |
KeyManager.getActiveKey(RealmModel realm,
KeyUse use,
String algorithm) |
KeyManager.ActiveRsaKey |
KeyManager.getActiveRsaKey(RealmModel realm)
Deprecated.
|
long |
UserSessionProvider.getActiveUserSessions(RealmModel realm,
ClientModel client) |
List<SecretKeyMetadata> |
KeyManager.getAesKeys(RealmModel realm)
Deprecated.
|
SecretKey |
KeyManager.getAesSecretKey(RealmModel realm,
String kid)
Deprecated.
|
List<ClientModel> |
RealmProvider.getAlwaysDisplayInConsoleClients(RealmModel realm)
Deprecated.
Use the corresponding method from
ClientProvider . |
List<ClientModel> |
ClientProvider.getAlwaysDisplayInConsoleClients(RealmModel realm)
Returns a list of clients that are expected to always show up in account console.
|
ClientModel |
RealmProvider.getClientByClientId(RealmModel realm,
String clientId)
Deprecated.
Use the corresponding method from
ClientProvider . |
default ClientModel |
RealmProvider.getClientByClientId(String clientId,
RealmModel realm)
Deprecated.
Use the corresponding method from
ClientProvider . |
ClientModel |
RealmProvider.getClientById(RealmModel realm,
String id)
Deprecated.
Use the corresponding method from
ClientProvider . |
default ClientModel |
RealmProvider.getClientById(String id,
RealmModel realm)
Deprecated.
Use the corresponding method from
ClientProvider . |
ClientInitialAccessModel |
RealmProvider.getClientInitialAccessModel(RealmModel realm,
String id) |
RoleModel |
RealmProvider.getClientRole(RealmModel realm,
ClientModel client,
String name)
TODO: To be @deprecated Use the corresponding method from
??RoleProvider . |
Set<RoleModel> |
RealmProvider.getClientRoles(RealmModel realm,
ClientModel client)
TODO: To be @deprecated Use the corresponding method from
??RoleProvider . |
Set<RoleModel> |
RealmProvider.getClientRoles(RealmModel realm,
ClientModel client,
Integer first,
Integer max) |
default List<ClientModel> |
RealmProvider.getClients(RealmModel realm)
Deprecated.
Use the corresponding method from
ClientProvider . |
default List<ClientModel> |
ClientProvider.getClients(RealmModel realm)
Returns all the clients of the given realm.
|
List<ClientModel> |
RealmProvider.getClients(RealmModel realm,
Integer firstResult,
Integer maxResults)
Deprecated.
Use the corresponding method from
ClientProvider . |
List<ClientModel> |
ClientProvider.getClients(RealmModel realm,
Integer firstResult,
Integer maxResults)
Returns the clients of the given realm.
|
ClientScopeModel |
RealmProvider.getClientScopeById(String id,
RealmModel realm) |
long |
RealmProvider.getClientsCount(RealmModel realm)
Deprecated.
Use the corresponding method from
ClientProvider . |
long |
ClientProvider.getClientsCount(RealmModel realm)
Returns number of clients in the given realm
|
List<String> |
UserCredentialManager.getConfiguredUserStorageCredentialTypes(RealmModel realm,
UserModel user)
Return credential types, which are provided by the user storage where user is stored.
|
UserConsentModel |
UserProvider.getConsentByClient(RealmModel realm,
String userId,
String clientInternalId) |
List<UserConsentModel> |
UserProvider.getConsents(RealmModel realm,
String userId) |
Set<String> |
UserCredentialManager.getDisableableCredentialTypes(RealmModel realm,
UserModel user)
Returns a set of credential types that can be disabled by disableCredentialType() method
|
Set<FederatedIdentityModel> |
UserProvider.getFederatedIdentities(UserModel user,
RealmModel realm) |
FederatedIdentityModel |
UserProvider.getFederatedIdentity(UserModel user,
String socialProvider,
RealmModel realm) |
GroupModel |
RealmProvider.getGroupById(String id,
RealmModel realm) |
List<GroupModel> |
RealmProvider.getGroups(RealmModel realm) |
List<GroupModel> |
RealmProvider.getGroupsByRole(RealmModel realm,
RoleModel role,
int firstResult,
int maxResults) |
Long |
RealmProvider.getGroupsCount(RealmModel realm,
Boolean onlyTopGroups) |
Long |
RealmProvider.getGroupsCountByNameContaining(RealmModel realm,
String search) |
List<SecretKeyMetadata> |
KeyManager.getHmacKeys(RealmModel realm)
Deprecated.
|
SecretKey |
KeyManager.getHmacSecretKey(RealmModel realm,
String kid)
Deprecated.
|
KeyWrapper |
KeyManager.getKey(RealmModel realm,
String kid,
KeyUse use,
String algorithm) |
List<KeyWrapper> |
KeyManager.getKeys(RealmModel realm) |
List<KeyWrapper> |
KeyManager.getKeys(RealmModel realm,
KeyUse use,
String algorithm) |
String |
OTPPolicy.getKeyURI(RealmModel realm,
UserModel user,
String secret)
Constructs the
otpauth:// URI based on the Key-Uri-Format. |
int |
UserProvider.getNotBeforeOfUser(RealmModel realm,
UserModel user) |
long |
UserSessionProvider.getOfflineSessionsCount(RealmModel realm,
ClientModel client) |
UserSessionModel |
UserSessionProvider.getOfflineUserSession(RealmModel realm,
String userSessionId) |
List<UserSessionModel> |
UserSessionProvider.getOfflineUserSessions(RealmModel realm,
ClientModel client,
int first,
int max) |
List<UserSessionModel> |
UserSessionProvider.getOfflineUserSessions(RealmModel realm,
UserModel user) |
RoleModel |
RealmProvider.getRealmRole(RealmModel realm,
String name) |
Set<RoleModel> |
RealmProvider.getRealmRoles(RealmModel realm) |
Set<RoleModel> |
RealmProvider.getRealmRoles(RealmModel realm,
Integer first,
Integer max) |
RoleModel |
RealmProvider.getRoleById(String id,
RealmModel realm) |
Certificate |
KeyManager.getRsaCertificate(RealmModel realm,
String kid)
Deprecated.
|
List<RsaKeyMetadata> |
KeyManager.getRsaKeys(RealmModel realm)
Deprecated.
|
PublicKey |
KeyManager.getRsaPublicKey(RealmModel realm,
String kid)
Deprecated.
|
List<GroupModel> |
RealmProvider.getTopLevelGroups(RealmModel realm) |
List<GroupModel> |
RealmProvider.getTopLevelGroups(RealmModel realm,
Integer first,
Integer max) |
UserModel |
UserProvider.getUserByFederatedIdentity(FederatedIdentityModel socialLink,
RealmModel realm) |
UserLoginFailureModel |
UserSessionProvider.getUserLoginFailure(RealmModel realm,
String userId) |
List<UserModel> |
UserProvider.getUsers(RealmModel realm,
boolean includeServiceAccounts) |
List<UserModel> |
UserProvider.getUsers(RealmModel realm,
int firstResult,
int maxResults,
boolean includeServiceAccounts) |
UserSessionModel |
UserSessionProvider.getUserSession(RealmModel realm,
String id) |
UserSessionModel |
UserSessionProvider.getUserSessionByBrokerSessionId(RealmModel realm,
String brokerSessionId) |
List<UserSessionModel> |
UserSessionProvider.getUserSessionByBrokerUserId(RealmModel realm,
String brokerUserId) |
List<UserSessionModel> |
UserSessionProvider.getUserSessions(RealmModel realm,
ClientModel client) |
List<UserSessionModel> |
UserSessionProvider.getUserSessions(RealmModel realm,
ClientModel client,
int firstResult,
int maxResults) |
List<UserSessionModel> |
UserSessionProvider.getUserSessions(RealmModel realm,
UserModel user) |
UserSessionModel |
UserSessionProvider.getUserSessionWithPredicate(RealmModel realm,
String id,
boolean offline,
Predicate<UserSessionModel> predicate)
Return userSession of specified ID as long as the predicate passes.
|
boolean |
UserCredentialManager.isConfiguredFor(RealmModel realm,
UserModel user,
String type)
Checks to see if user has credential type configured.
|
boolean |
UserCredentialManager.isConfiguredLocally(RealmModel realm,
UserModel user,
String type)
Only loops through each CredentialProvider to see if credential type is configured for the user.
|
boolean |
UserCredentialManager.isValid(RealmModel realm,
UserModel user,
CredentialInput... inputs)
Validates list of credentials.
|
boolean |
UserCredentialManager.isValid(RealmModel realm,
UserModel user,
List<CredentialInput> inputs)
Validates list of credentials.
|
List<ClientInitialAccessModel> |
RealmProvider.listClientInitialAccess(RealmModel realm) |
void |
RealmProvider.moveGroup(RealmModel realm,
GroupModel group,
GroupModel toParent) |
void |
UserSessionProvider.onClientRemoved(RealmModel realm,
ClientModel client) |
void |
UserSessionProvider.onRealmRemoved(RealmModel realm) |
void |
UserProvider.preRemove(RealmModel realm) |
void |
UserProvider.preRemove(RealmModel realm,
ClientModel client) |
void |
UserProvider.preRemove(RealmModel realm,
ComponentModel component) |
void |
UserProvider.preRemove(RealmModel realm,
GroupModel group) |
void |
UserProvider.preRemove(RealmModel realm,
IdentityProviderModel provider) |
void |
UserProvider.preRemove(RealmModel realm,
RoleModel role) |
void |
UserSessionProvider.removeAllUserLoginFailures(RealmModel realm) |
boolean |
RealmProvider.removeClient(RealmModel realm,
String id)
Deprecated.
Use the corresponding method from
ClientProvider . |
boolean |
ClientProvider.removeClient(RealmModel realm,
String id)
Removes given client from the given realm.
|
default boolean |
RealmProvider.removeClient(String id,
RealmModel realm)
Deprecated.
Use the corresponding method from
ClientProvider . |
default boolean |
ClientProvider.removeClient(String id,
RealmModel realm)
Deprecated.
Use
ClientProvider.removeClient(RealmModel, String) instead. |
void |
RealmProvider.removeClientInitialAccessModel(RealmModel realm,
String id) |
void |
ClientProvider.removeClients(RealmModel realm)
Removes all clients from the given realm.
|
void |
UserSessionProvider.removeExpired(RealmModel realm)
Implementation doesn't need to propagate removal of expired userSessions to userSessionPersister.
|
boolean |
UserProvider.removeFederatedIdentity(RealmModel realm,
UserModel user,
String socialProvider) |
boolean |
RealmProvider.removeGroup(RealmModel realm,
GroupModel group) |
void |
UserProvider.removeImportedUsers(RealmModel realm,
String storageProviderId)
Removes any imported users from a specific User Storage Provider.
|
void |
UserSessionProvider.removeOfflineUserSession(RealmModel realm,
UserSessionModel userSession)
Removes the attached clientSessions as well
|
boolean |
RealmProvider.removeRole(RealmModel realm,
RoleModel role) |
boolean |
UserManager.removeUser(RealmModel realm,
UserModel user) |
boolean |
UserManager.removeUser(RealmModel realm,
UserModel user,
UserProvider userProvider) |
void |
UserSessionProvider.removeUserLoginFailure(RealmModel realm,
String userId) |
void |
UserSessionProvider.removeUserSession(RealmModel realm,
UserSessionModel session)
This will remove attached ClientLoginSessionModels too
|
void |
UserSessionProvider.removeUserSessions(RealmModel realm) |
void |
UserSessionProvider.removeUserSessions(RealmModel realm,
UserModel user) |
void |
UserSessionModel.restartSession(RealmModel realm,
UserModel user,
String loginUsername,
String ipAddress,
String authMethod,
boolean rememberMe,
String brokerSessionId,
String brokerUserId) |
boolean |
UserProvider.revokeConsentForClient(RealmModel realm,
String userId,
String clientInternalId) |
List<ClientModel> |
RealmProvider.searchClientsByClientId(RealmModel realm,
String clientId,
Integer firstResult,
Integer maxResults)
Deprecated.
Use the corresponding method from
ClientProvider . |
default List<ClientModel> |
RealmProvider.searchClientsByClientId(String clientId,
Integer firstResult,
Integer maxResults,
RealmModel realm)
Deprecated.
Use the corresponding method from
ClientProvider . |
Set<RoleModel> |
RealmProvider.searchForClientRoles(RealmModel realm,
ClientModel client,
String search,
Integer first,
Integer max) |
List |
RealmProvider.searchForGroupByName(RealmModel realm,
String search,
Integer first,
Integer max) |
Set<RoleModel> |
RealmProvider.searchForRoles(RealmModel realm,
String search,
Integer first,
Integer max) |
void |
UserProvider.setNotBeforeForUser(RealmModel realm,
UserModel user,
int notBefore) |
void |
KeycloakContext.setRealm(RealmModel realm) |
static void |
ImpersonationConstants.setupImpersonationService(KeycloakSession session,
RealmModel realm) |
static void |
ImpersonationConstants.setupMasterRealmRole(RealmProvider model,
RealmModel realm) |
static void |
ImpersonationConstants.setupRealmRole(RealmModel realm) |
void |
UserProvider.unlinkUsers(RealmModel realm,
String storageProviderId)
Set federation link to null to imported users of a specific User Storage Provider
|
void |
UserProvider.updateConsent(RealmModel realm,
String userId,
UserConsentModel consent) |
boolean |
UserCredentialManager.updateCredential(RealmModel realm,
UserModel user,
CredentialInput input)
Updates a credential.
|
void |
UserCredentialManager.updateCredentialLabel(RealmModel realm,
UserModel user,
String credentialId,
String userLabel)
Updates the credential label and invalidates the cache for the user.
|
void |
UserProvider.updateFederatedIdentity(RealmModel realm,
UserModel federatedUser,
FederatedIdentityModel federatedIdentityModel) |
void |
IdentityProviderModel.validate(RealmModel realm)
Validates this configuration.
|
Modifier and Type | Interface and Description |
---|---|
interface |
CachedRealmModel
Cached realms will implement this interface
|
Modifier and Type | Method and Description |
---|---|
RealmModel |
CachedRealmModel.getDelegateForUpdate()
Invalidates the cache for this model and returns a delegate that represents the actual data provider
|
Modifier and Type | Method and Description |
---|---|
void |
UserCache.evict(RealmModel realm)
Evict users of a specific realm
|
void |
UserCache.evict(RealmModel realm,
UserModel user)
Evict user from cache.
|
void |
OnUserCache.onCache(RealmModel realm,
CachedUserModel user,
UserModel delegate) |
Modifier and Type | Field and Description |
---|---|
protected RealmModel |
ClientScopeAdapter.cachedRealm |
protected RealmModel |
ClientAdapter.cachedRealm |
protected RealmModel |
UserAdapter.realm |
protected RealmModel |
RoleAdapter.realm |
protected RealmModel |
GroupAdapter.realm |
protected RealmModel |
RealmAdapter.updated |
Modifier and Type | Method and Description |
---|---|
RealmModel |
RealmCacheSession.createRealm(String name) |
RealmModel |
RealmCacheSession.createRealm(String id,
String name) |
RealmModel |
RealmAdapter.getDelegateForUpdate() |
RealmModel |
ClientScopeAdapter.getRealm() |
RealmModel |
ClientAdapter.getRealm() |
RealmModel |
RealmCacheSession.getRealm(String id) |
RealmModel |
RealmCacheSession.getRealmByName(String name) |
Modifier and Type | Method and Description |
---|---|
List<RealmModel> |
RealmCacheSession.getRealms() |
List<RealmModel> |
RealmCacheSession.getRealmsWithProviderType(Class<?> type) |
Modifier and Type | Method and Description |
---|---|
ClientModel |
RealmCacheSession.addClient(RealmModel realm,
String clientId) |
ClientModel |
RealmCacheSession.addClient(RealmModel realm,
String id,
String clientId) |
RoleModel |
RealmCacheSession.addClientRole(RealmModel realm,
ClientModel client,
String name) |
RoleModel |
RealmCacheSession.addClientRole(RealmModel realm,
ClientModel client,
String id,
String name) |
void |
UserCacheSession.addConsent(RealmModel realm,
String userId,
UserConsentModel consent) |
void |
UserCacheSession.addFederatedIdentity(RealmModel realm,
UserModel user,
FederatedIdentityModel socialLink) |
RoleModel |
RealmCacheSession.addRealmRole(RealmModel realm,
String name) |
RoleModel |
RealmCacheSession.addRealmRole(RealmModel realm,
String id,
String name) |
void |
RealmCacheSession.addTopLevelGroup(RealmModel realm,
GroupModel subGroup) |
UserModel |
UserCacheSession.addUser(RealmModel realm,
String username) |
UserModel |
UserCacheSession.addUser(RealmModel realm,
String id,
String username,
boolean addDefaultRoles,
boolean addDefaultRequiredActions) |
protected ClientModel |
RealmCacheSession.cacheClient(RealmModel realm,
ClientModel delegate,
Long revision) |
protected UserModel |
UserCacheSession.cacheUser(RealmModel realm,
UserModel delegate,
Long revision) |
ClientInitialAccessModel |
RealmCacheSession.createClientInitialAccessModel(RealmModel realm,
int expiration,
int count) |
GroupModel |
RealmCacheSession.createGroup(RealmModel realm,
String id,
String name,
GroupModel toParent) |
void |
RealmCacheSession.decreaseRemainingCount(RealmModel realm,
ClientInitialAccessModel clientInitialAccess) |
void |
UserCacheSession.evict(RealmModel realm) |
void |
UserCacheSession.evict(RealmModel realm,
UserModel user) |
void |
RealmCacheSession.evictRealmOnRemoval(RealmModel realm) |
protected void |
UserCacheSession.fullyInvalidateUser(RealmModel realm,
UserModel user) |
List<ClientModel> |
RealmCacheSession.getAlwaysDisplayInConsoleClients(RealmModel realm) |
ClientModel |
RealmCacheSession.getClientByClientId(RealmModel realm,
String clientId) |
ClientModel |
RealmCacheSession.getClientById(RealmModel realm,
String id) |
ClientInitialAccessModel |
RealmCacheSession.getClientInitialAccessModel(RealmModel realm,
String id) |
RoleModel |
RealmCacheSession.getClientRole(RealmModel realm,
ClientModel client,
String name) |
Set<RoleModel> |
RealmCacheSession.getClientRoles(RealmModel realm,
ClientModel client) |
Set<RoleModel> |
RealmCacheSession.getClientRoles(RealmModel realm,
ClientModel client,
Integer first,
Integer max) |
List<ClientModel> |
RealmCacheSession.getClients(RealmModel realm) |
List<ClientModel> |
RealmCacheSession.getClients(RealmModel realm,
Integer firstResult,
Integer maxResults) |
ClientScopeModel |
RealmCacheSession.getClientScopeById(String id,
RealmModel realm) |
long |
RealmCacheSession.getClientsCount(RealmModel realm) |
UserConsentModel |
UserCacheSession.getConsentByClient(RealmModel realm,
String userId,
String clientId) |
List<UserConsentModel> |
UserCacheSession.getConsents(RealmModel realm,
String userId) |
Set<FederatedIdentityModel> |
UserCacheSession.getFederatedIdentities(UserModel user,
RealmModel realm) |
FederatedIdentityModel |
UserCacheSession.getFederatedIdentity(UserModel user,
String socialProvider,
RealmModel realm) |
GroupModel |
RealmCacheSession.getGroupById(String id,
RealmModel realm) |
List<UserModel> |
UserCacheSession.getGroupMembers(RealmModel realm,
GroupModel group) |
List<UserModel> |
UserCacheSession.getGroupMembers(RealmModel realm,
GroupModel group,
int firstResult,
int maxResults) |
List<GroupModel> |
RealmCacheSession.getGroups(RealmModel realm) |
List<GroupModel> |
RealmCacheSession.getGroupsByRole(RealmModel realm,
RoleModel role,
int firstResult,
int maxResults) |
Long |
RealmCacheSession.getGroupsCount(RealmModel realm,
Boolean onlyTopGroups) |
Long |
RealmCacheSession.getGroupsCountByNameContaining(RealmModel realm,
String search) |
int |
UserCacheSession.getNotBeforeOfUser(RealmModel realm,
UserModel user) |
RoleModel |
RealmCacheSession.getRealmRole(RealmModel realm,
String name) |
Set<RoleModel> |
RealmCacheSession.getRealmRoles(RealmModel realm) |
Set<RoleModel> |
RealmCacheSession.getRealmRoles(RealmModel realm,
Integer first,
Integer max) |
RoleModel |
RealmCacheSession.getRoleById(String id,
RealmModel realm) |
List<UserModel> |
UserCacheSession.getRoleMembers(RealmModel realm,
RoleModel role) |
List<UserModel> |
UserCacheSession.getRoleMembers(RealmModel realm,
RoleModel role,
int firstResult,
int maxResults) |
List<GroupModel> |
RealmCacheSession.getTopLevelGroups(RealmModel realm) |
List<GroupModel> |
RealmCacheSession.getTopLevelGroups(RealmModel realm,
Integer first,
Integer max) |
protected UserModel |
UserCacheSession.getUserAdapter(RealmModel realm,
String userId,
Long loaded,
UserModel delegate) |
UserModel |
UserCacheSession.getUserByEmail(String email,
RealmModel realm) |
UserModel |
UserCacheSession.getUserByFederatedIdentity(FederatedIdentityModel socialLink,
RealmModel realm) |
UserModel |
UserCacheSession.getUserById(String id,
RealmModel realm) |
UserModel |
UserCacheSession.getUserByUsername(String username,
RealmModel realm) |
List<UserModel> |
UserCacheSession.getUsers(RealmModel realm) |
List<UserModel> |
UserCacheSession.getUsers(RealmModel realm,
boolean includeServiceAccounts) |
List<UserModel> |
UserCacheSession.getUsers(RealmModel realm,
int firstResult,
int maxResults) |
List<UserModel> |
UserCacheSession.getUsers(RealmModel realm,
int firstResult,
int maxResults,
boolean includeServiceAccounts) |
int |
UserCacheSession.getUsersCount(Map<String,String> params,
RealmModel realm) |
int |
UserCacheSession.getUsersCount(Map<String,String> params,
RealmModel realm,
Set<String> groupIds) |
int |
UserCacheSession.getUsersCount(RealmModel realm) |
int |
UserCacheSession.getUsersCount(RealmModel realm,
boolean includeServiceAccount) |
int |
UserCacheSession.getUsersCount(RealmModel realm,
Set<String> groupIds) |
int |
UserCacheSession.getUsersCount(String search,
RealmModel realm) |
int |
UserCacheSession.getUsersCount(String search,
RealmModel realm,
Set<String> groupIds) |
void |
UserCacheSession.grantToAllUsers(RealmModel realm,
RoleModel role) |
List<ClientInitialAccessModel> |
RealmCacheSession.listClientInitialAccess(RealmModel realm) |
void |
RealmCacheSession.moveGroup(RealmModel realm,
GroupModel group,
GroupModel toParent) |
void |
UserCacheSession.preRemove(RealmModel realm) |
void |
UserCacheSession.preRemove(RealmModel realm,
ClientModel client) |
void |
UserCacheSession.preRemove(RealmModel realm,
ComponentModel component) |
void |
UserCacheSession.preRemove(RealmModel realm,
GroupModel group) |
void |
UserCacheSession.preRemove(RealmModel realm,
IdentityProviderModel provider) |
void |
UserCacheSession.preRemove(RealmModel realm,
RoleModel role) |
void |
UserCacheSession.registerUserInvalidation(RealmModel realm,
CachedUser user) |
boolean |
RealmCacheSession.removeClient(RealmModel realm,
String id) |
void |
RealmCacheSession.removeClientInitialAccessModel(RealmModel realm,
String id) |
void |
RealmCacheSession.removeClients(RealmModel realm) |
boolean |
UserCacheSession.removeFederatedIdentity(RealmModel realm,
UserModel user,
String socialProvider) |
boolean |
RealmCacheSession.removeGroup(RealmModel realm,
GroupModel group) |
void |
UserCacheSession.removeImportedUsers(RealmModel realm,
String storageProviderId) |
boolean |
RealmCacheSession.removeRole(RealmModel realm,
RoleModel role) |
boolean |
UserCacheSession.removeUser(RealmModel realm,
UserModel user) |
boolean |
UserCacheSession.revokeConsentForClient(RealmModel realm,
String userId,
String clientInternalId) |
List<ClientModel> |
RealmCacheSession.searchClientsByClientId(RealmModel realm,
String clientId,
Integer firstResult,
Integer maxResults) |
Set<RoleModel> |
RealmCacheSession.searchForClientRoles(RealmModel realm,
ClientModel client,
String search,
Integer first,
Integer max) |
List<GroupModel> |
RealmCacheSession.searchForGroupByName(RealmModel realm,
String search,
Integer first,
Integer max) |
Set<RoleModel> |
RealmCacheSession.searchForRoles(RealmModel realm,
String search,
Integer first,
Integer max) |
List<UserModel> |
UserCacheSession.searchForUser(Map<String,String> attributes,
RealmModel realm) |
List<UserModel> |
UserCacheSession.searchForUser(Map<String,String> attributes,
RealmModel realm,
int firstResult,
int maxResults) |
List<UserModel> |
UserCacheSession.searchForUser(String search,
RealmModel realm) |
List<UserModel> |
UserCacheSession.searchForUser(String search,
RealmModel realm,
int firstResult,
int maxResults) |
List<UserModel> |
UserCacheSession.searchForUserByUserAttribute(String attrName,
String attrValue,
RealmModel realm) |
void |
UserCacheSession.setNotBeforeForUser(RealmModel realm,
UserModel user,
int notBefore) |
void |
UserCacheSession.unlinkUsers(RealmModel realm,
String storageProviderId) |
void |
UserCacheSession.updateConsent(RealmModel realm,
String userId,
UserConsentModel consent) |
void |
UserCacheSession.updateFederatedIdentity(RealmModel realm,
UserModel federatedUser,
FederatedIdentityModel federatedIdentityModel) |
protected ClientModel |
RealmCacheSession.validateCache(RealmModel realm,
CachedClient cached) |
protected UserModel |
UserCacheSession.validateCache(RealmModel realm,
CachedUser cached) |
Constructor and Description |
---|
ClientAdapter(RealmModel cachedRealm,
CachedClient cached,
RealmCacheSession cacheSession) |
ClientScopeAdapter(RealmModel cachedRealm,
CachedClientScope cached,
RealmCacheSession cacheSession) |
GroupAdapter(CachedGroup cached,
RealmCacheSession cacheSession,
KeycloakSession keycloakSession,
RealmModel realm) |
RoleAdapter(CachedRole cached,
RealmCacheSession session,
RealmModel realm) |
UserAdapter(CachedUser cached,
UserCacheSession userProvider,
KeycloakSession keycloakSession,
RealmModel realm) |
Modifier and Type | Method and Description |
---|---|
protected void |
CachedRealm.cacheClientScopes(RealmModel model) |
Modifier and Type | Method and Description |
---|---|
static OTPCredentialModel |
OTPCredentialModel.createFromPolicy(RealmModel realm,
String secretValue) |
static OTPCredentialModel |
OTPCredentialModel.createFromPolicy(RealmModel realm,
String secretValue,
String userLabel) |
Modifier and Type | Class and Description |
---|---|
class |
RealmAdapter |
Modifier and Type | Field and Description |
---|---|
protected RealmModel |
UserAdapter.realm |
protected RealmModel |
RoleAdapter.realm |
protected RealmModel |
GroupAdapter.realm |
protected RealmModel |
ClientScopeAdapter.realm |
protected RealmModel |
ClientAdapter.realm |
Modifier and Type | Method and Description |
---|---|
RealmModel |
JpaRealmProvider.createRealm(String name) |
RealmModel |
JpaRealmProvider.createRealm(String id,
String name) |
RealmModel |
ClientScopeAdapter.getRealm() |
RealmModel |
ClientAdapter.getRealm() |
RealmModel |
JpaRealmProvider.getRealm(String id) |
RealmModel |
JpaRealmProvider.getRealmByName(String name) |
Modifier and Type | Method and Description |
---|---|
List<RealmModel> |
JpaRealmProvider.getRealms() |
List<RealmModel> |
JpaRealmProvider.getRealmsWithProviderType(Class<?> providerType) |
Modifier and Type | Method and Description |
---|---|
ClientModel |
JpaRealmProvider.addClient(RealmModel realm,
String clientId) |
ClientModel |
JpaRealmProvider.addClient(RealmModel realm,
String id,
String clientId) |
RoleModel |
JpaRealmProvider.addClientRole(RealmModel realm,
ClientModel client,
String name) |
RoleModel |
JpaRealmProvider.addClientRole(RealmModel realm,
ClientModel client,
String id,
String name) |
void |
JpaUserProvider.addConsent(RealmModel realm,
String userId,
UserConsentModel consent) |
void |
JpaUserProvider.addFederatedIdentity(RealmModel realm,
UserModel user,
FederatedIdentityModel identity) |
RoleModel |
JpaRealmProvider.addRealmRole(RealmModel realm,
String name) |
RoleModel |
JpaRealmProvider.addRealmRole(RealmModel realm,
String id,
String name) |
void |
JpaRealmProvider.addTopLevelGroup(RealmModel realm,
GroupModel subGroup) |
UserModel |
JpaUserProvider.addUser(RealmModel realm,
String username) |
UserModel |
JpaUserProvider.addUser(RealmModel realm,
String id,
String username,
boolean addDefaultRoles,
boolean addDefaultRequiredActions) |
ClientInitialAccessModel |
JpaRealmProvider.createClientInitialAccessModel(RealmModel realm,
int expiration,
int count) |
CredentialModel |
JpaUserProvider.createCredential(RealmModel realm,
UserModel user,
CredentialModel cred) |
CredentialModel |
JpaUserCredentialStore.createCredential(RealmModel realm,
UserModel user,
CredentialModel cred) |
GroupModel |
JpaRealmProvider.createGroup(RealmModel realm,
String id,
String name,
GroupModel toParent) |
void |
JpaRealmProvider.decreaseRemainingCount(RealmModel realm,
ClientInitialAccessModel clientInitialAccess) |
protected void |
JpaUserProvider.ensureEmailConstraint(List<UserEntity> users,
RealmModel realm) |
List<ClientModel> |
JpaRealmProvider.getAlwaysDisplayInConsoleClients(RealmModel realm) |
ClientModel |
JpaRealmProvider.getClientByClientId(RealmModel realm,
String clientId) |
ClientModel |
JpaRealmProvider.getClientById(RealmModel realm,
String id) |
ClientInitialAccessModel |
JpaRealmProvider.getClientInitialAccessModel(RealmModel realm,
String id) |
RoleModel |
JpaRealmProvider.getClientRole(RealmModel realm,
ClientModel client,
String name) |
Set<RoleModel> |
JpaRealmProvider.getClientRoles(RealmModel realm,
ClientModel client) |
Set<RoleModel> |
JpaRealmProvider.getClientRoles(RealmModel realm,
ClientModel client,
Integer first,
Integer max) |
List<ClientModel> |
JpaRealmProvider.getClients(RealmModel realm,
Integer firstResult,
Integer maxResults) |
ClientScopeModel |
JpaRealmProvider.getClientScopeById(String id,
RealmModel realm) |
long |
JpaRealmProvider.getClientsCount(RealmModel realm) |
UserConsentModel |
JpaUserProvider.getConsentByClient(RealmModel realm,
String userId,
String clientId) |
List<UserConsentModel> |
JpaUserProvider.getConsents(RealmModel realm,
String userId) |
Set<FederatedIdentityModel> |
JpaUserProvider.getFederatedIdentities(UserModel user,
RealmModel realm) |
FederatedIdentityModel |
JpaUserProvider.getFederatedIdentity(UserModel user,
String identityProvider,
RealmModel realm) |
GroupModel |
JpaRealmProvider.getGroupById(String id,
RealmModel realm) |
List<UserModel> |
JpaUserProvider.getGroupMembers(RealmModel realm,
GroupModel group) |
List<UserModel> |
JpaUserProvider.getGroupMembers(RealmModel realm,
GroupModel group,
int firstResult,
int maxResults) |
List<GroupModel> |
JpaRealmProvider.getGroups(RealmModel realm) |
List<GroupModel> |
JpaRealmProvider.getGroupsByRole(RealmModel realm,
RoleModel role,
int firstResult,
int maxResults) |
Long |
JpaRealmProvider.getGroupsCount(RealmModel realm,
Boolean onlyTopGroups) |
Long |
JpaRealmProvider.getGroupsCountByNameContaining(RealmModel realm,
String search) |
int |
JpaUserProvider.getNotBeforeOfUser(RealmModel realm,
UserModel user) |
RoleModel |
JpaRealmProvider.getRealmRole(RealmModel realm,
String name) |
Set<RoleModel> |
JpaRealmProvider.getRealmRoles(RealmModel realm) |
Set<RoleModel> |
JpaRealmProvider.getRealmRoles(RealmModel realm,
Integer first,
Integer max) |
RoleModel |
JpaRealmProvider.getRoleById(String id,
RealmModel realm) |
List<UserModel> |
JpaUserProvider.getRoleMembers(RealmModel realm,
RoleModel role) |
List<UserModel> |
JpaUserProvider.getRoleMembers(RealmModel realm,
RoleModel role,
int firstResult,
int maxResults) |
protected Set<RoleModel> |
JpaRealmProvider.getRoles(javax.persistence.TypedQuery<RoleEntity> query,
RealmModel realm,
Integer first,
Integer max) |
CredentialModel |
JpaUserProvider.getStoredCredentialById(RealmModel realm,
UserModel user,
String id) |
CredentialModel |
JpaUserCredentialStore.getStoredCredentialById(RealmModel realm,
UserModel user,
String id) |
CredentialModel |
JpaUserProvider.getStoredCredentialByNameAndType(RealmModel realm,
UserModel user,
String name,
String type) |
CredentialModel |
JpaUserCredentialStore.getStoredCredentialByNameAndType(RealmModel realm,
UserModel user,
String name,
String type) |
List<CredentialModel> |
JpaUserProvider.getStoredCredentials(RealmModel realm,
UserModel user) |
List<CredentialModel> |
JpaUserCredentialStore.getStoredCredentials(RealmModel realm,
UserModel user) |
List<CredentialModel> |
JpaUserProvider.getStoredCredentialsByType(RealmModel realm,
UserModel user,
String type) |
List<CredentialModel> |
JpaUserCredentialStore.getStoredCredentialsByType(RealmModel realm,
UserModel user,
String type) |
List<GroupModel> |
JpaRealmProvider.getTopLevelGroups(RealmModel realm) |
List<GroupModel> |
JpaRealmProvider.getTopLevelGroups(RealmModel realm,
Integer first,
Integer max) |
UserModel |
JpaUserProvider.getUserByEmail(String email,
RealmModel realm) |
UserModel |
JpaUserProvider.getUserByFederatedIdentity(FederatedIdentityModel identity,
RealmModel realm) |
UserModel |
JpaUserProvider.getUserById(String id,
RealmModel realm) |
UserModel |
JpaUserProvider.getUserByUsername(String username,
RealmModel realm) |
List<UserModel> |
JpaUserProvider.getUsers(RealmModel realm) |
List<UserModel> |
JpaUserProvider.getUsers(RealmModel realm,
boolean includeServiceAccounts) |
List<UserModel> |
JpaUserProvider.getUsers(RealmModel realm,
int firstResult,
int maxResults) |
List<UserModel> |
JpaUserProvider.getUsers(RealmModel realm,
int firstResult,
int maxResults,
boolean includeServiceAccounts) |
int |
JpaUserProvider.getUsersCount(Map<String,String> params,
RealmModel realm) |
int |
JpaUserProvider.getUsersCount(Map<String,String> params,
RealmModel realm,
Set<String> groupIds) |
int |
JpaUserProvider.getUsersCount(RealmModel realm) |
int |
JpaUserProvider.getUsersCount(RealmModel realm,
boolean includeServiceAccount) |
int |
JpaUserProvider.getUsersCount(RealmModel realm,
Set<String> groupIds) |
int |
JpaUserProvider.getUsersCount(String search,
RealmModel realm) |
int |
JpaUserProvider.getUsersCount(String search,
RealmModel realm,
Set<String> groupIds) |
void |
JpaUserProvider.grantToAllUsers(RealmModel realm,
RoleModel role) |
List<ClientInitialAccessModel> |
JpaRealmProvider.listClientInitialAccess(RealmModel realm) |
boolean |
JpaUserProvider.moveCredentialTo(RealmModel realm,
UserModel user,
String id,
String newPreviousCredentialId) |
boolean |
JpaUserCredentialStore.moveCredentialTo(RealmModel realm,
UserModel user,
String id,
String newPreviousCredentialId) |
void |
JpaRealmProvider.moveGroup(RealmModel realm,
GroupModel group,
GroupModel toParent) |
void |
JpaUserProvider.preRemove(RealmModel realm) |
void |
JpaUserProvider.preRemove(RealmModel realm,
ClientModel client) |
void |
JpaUserProvider.preRemove(RealmModel realm,
ComponentModel component) |
void |
JpaUserProvider.preRemove(RealmModel realm,
GroupModel group) |
void |
JpaUserProvider.preRemove(RealmModel realm,
IdentityProviderModel provider) |
void |
JpaUserProvider.preRemove(RealmModel realm,
RoleModel role) |
boolean |
JpaRealmProvider.removeClient(RealmModel realm,
String id) |
void |
JpaRealmProvider.removeClientInitialAccessModel(RealmModel realm,
String id) |
void |
JpaRealmProvider.removeClients(RealmModel realm) |
protected void |
JpaUserProvider.removeConsentByClientStorageProvider(RealmModel realm,
String providerId) |
boolean |
JpaUserProvider.removeFederatedIdentity(RealmModel realm,
UserModel user,
String identityProvider) |
boolean |
JpaRealmProvider.removeGroup(RealmModel realm,
GroupModel group) |
void |
JpaUserProvider.removeImportedUsers(RealmModel realm,
String storageProviderId) |
boolean |
JpaRealmProvider.removeRole(RealmModel realm,
RoleModel role) |
boolean |
JpaUserProvider.removeStoredCredential(RealmModel realm,
UserModel user,
String id) |
boolean |
JpaUserCredentialStore.removeStoredCredential(RealmModel realm,
UserModel user,
String id) |
boolean |
JpaUserProvider.removeUser(RealmModel realm,
UserModel user) |
boolean |
JpaUserProvider.revokeConsentForClient(RealmModel realm,
String userId,
String clientId) |
List<ClientModel> |
JpaRealmProvider.searchClientsByClientId(RealmModel realm,
String clientId,
Integer firstResult,
Integer maxResults) |
Set<RoleModel> |
JpaRealmProvider.searchForClientRoles(RealmModel realm,
ClientModel client,
String search,
Integer first,
Integer max) |
List<GroupModel> |
JpaRealmProvider.searchForGroupByName(RealmModel realm,
String search,
Integer first,
Integer max) |
Set<RoleModel> |
JpaRealmProvider.searchForRoles(RealmModel realm,
String search,
Integer first,
Integer max) |
protected Set<RoleModel> |
JpaRealmProvider.searchForRoles(javax.persistence.TypedQuery<RoleEntity> query,
RealmModel realm,
String search,
Integer first,
Integer max) |
List<UserModel> |
JpaUserProvider.searchForUser(Map<String,String> attributes,
RealmModel realm) |
List<UserModel> |
JpaUserProvider.searchForUser(Map<String,String> attributes,
RealmModel realm,
int firstResult,
int maxResults) |
List<UserModel> |
JpaUserProvider.searchForUser(String search,
RealmModel realm) |
List<UserModel> |
JpaUserProvider.searchForUser(String search,
RealmModel realm,
int firstResult,
int maxResults) |
List<UserModel> |
JpaUserProvider.searchForUserByUserAttribute(String attrName,
String attrValue,
RealmModel realm) |
void |
JpaUserProvider.setNotBeforeForUser(RealmModel realm,
UserModel user,
int notBefore) |
void |
JpaUserProvider.unlinkUsers(RealmModel realm,
String storageProviderId) |
void |
JpaUserProvider.updateConsent(RealmModel realm,
String userId,
UserConsentModel consent) |
void |
JpaUserProvider.updateCredential(RealmModel realm,
UserModel user,
CredentialModel cred) |
void |
JpaUserCredentialStore.updateCredential(RealmModel realm,
UserModel user,
CredentialModel cred) |
void |
JpaUserProvider.updateFederatedIdentity(RealmModel realm,
UserModel federatedUser,
FederatedIdentityModel federatedIdentityModel) |
Constructor and Description |
---|
ClientAdapter(RealmModel realm,
javax.persistence.EntityManager em,
KeycloakSession session,
ClientEntity entity) |
ClientScopeAdapter(RealmModel realm,
javax.persistence.EntityManager em,
KeycloakSession session,
ClientScopeEntity entity) |
GroupAdapter(RealmModel realm,
javax.persistence.EntityManager em,
GroupEntity group) |
RoleAdapter(KeycloakSession session,
RealmModel realm,
javax.persistence.EntityManager em,
RoleEntity role) |
UserAdapter(KeycloakSession session,
RealmModel realm,
javax.persistence.EntityManager em,
UserEntity user) |
Modifier and Type | Method and Description |
---|---|
void |
JpaUserSessionPersisterProvider.onClientRemoved(RealmModel realm,
ClientModel client) |
void |
JpaUserSessionPersisterProvider.onRealmRemoved(RealmModel realm) |
void |
JpaUserSessionPersisterProvider.onUserRemoved(RealmModel realm,
UserModel user) |
void |
JpaUserSessionPersisterProvider.removeExpired(RealmModel realm) |
void |
JpaUserSessionPersisterProvider.updateLastSessionRefreshes(RealmModel realm,
int lastSessionRefresh,
Collection<String> userSessionIds,
boolean offline) |
Modifier and Type | Field and Description |
---|---|
protected RealmModel |
AbstractClientModel.realm |
Modifier and Type | Method and Description |
---|---|
RealmModel |
MapClientAdapter.getRealm() |
Modifier and Type | Method and Description |
---|---|
ClientModel |
MapClientProvider.addClient(RealmModel realm,
String id,
String clientId) |
List<ClientModel> |
MapClientProvider.getAlwaysDisplayInConsoleClients(RealmModel realm) |
ClientModel |
MapClientProvider.getClientByClientId(RealmModel realm,
String clientId) |
ClientModel |
MapClientProvider.getClientById(RealmModel realm,
String id) |
List<ClientModel> |
MapClientProvider.getClients(RealmModel realm) |
List<ClientModel> |
MapClientProvider.getClients(RealmModel realm,
Integer firstResult,
Integer maxResults) |
long |
MapClientProvider.getClientsCount(RealmModel realm) |
Stream<ClientModel> |
MapClientProvider.getClientsStream(RealmModel realm) |
boolean |
MapClientProvider.removeClient(RealmModel realm,
String id) |
void |
MapClientProvider.removeClients(RealmModel realm) |
List<ClientModel> |
MapClientProvider.searchClientsByClientId(RealmModel realm,
String clientId,
Integer firstResult,
Integer maxResults) |
Constructor and Description |
---|
AbstractClientModel(KeycloakSession session,
RealmModel realm,
E entity) |
MapClientAdapter(KeycloakSession session,
RealmModel realm,
MapClientEntity entity) |
Modifier and Type | Method and Description |
---|---|
RealmModel |
PersistentUserSessionAdapter.getRealm() |
RealmModel |
PersistentAuthenticatedClientSessionAdapter.getRealm() |
Modifier and Type | Method and Description |
---|---|
void |
UserSessionPersisterProvider.onClientRemoved(RealmModel realm,
ClientModel client) |
void |
DisabledUserSessionPersisterProvider.onClientRemoved(RealmModel realm,
ClientModel client) |
void |
UserSessionPersisterProvider.onRealmRemoved(RealmModel realm) |
void |
DisabledUserSessionPersisterProvider.onRealmRemoved(RealmModel realm) |
void |
UserSessionPersisterProvider.onUserRemoved(RealmModel realm,
UserModel user) |
void |
DisabledUserSessionPersisterProvider.onUserRemoved(RealmModel realm,
UserModel user) |
void |
UserSessionPersisterProvider.removeExpired(RealmModel realm) |
void |
DisabledUserSessionPersisterProvider.removeExpired(RealmModel realm) |
void |
PersistentUserSessionAdapter.restartSession(RealmModel realm,
UserModel user,
String loginUsername,
String ipAddress,
String authMethod,
boolean rememberMe,
String brokerSessionId,
String brokerUserId) |
void |
UserSessionPersisterProvider.updateLastSessionRefreshes(RealmModel realm,
int lastSessionRefresh,
Collection<String> userSessionIds,
boolean offline) |
void |
DisabledUserSessionPersisterProvider.updateLastSessionRefreshes(RealmModel realm,
int lastSessionRefresh,
Collection<String> userSessionIds,
boolean offline) |
Constructor and Description |
---|
PersistentAuthenticatedClientSessionAdapter(PersistentClientSessionModel model,
RealmModel realm,
ClientModel client,
UserSessionModel userSession) |
PersistentUserSessionAdapter(KeycloakSession session,
PersistentUserSessionModel model,
RealmModel realm,
String userId,
Map<String,AuthenticatedClientSessionModel> clientSessions) |
Modifier and Type | Method and Description |
---|---|
RealmModel |
UserSessionAdapter.getRealm() |
RealmModel |
RootAuthenticationSessionAdapter.getRealm() |
RealmModel |
AuthenticationSessionAdapter.getRealm() |
RealmModel |
AuthenticatedClientSessionAdapter.getRealm() |
Modifier and Type | Method and Description |
---|---|
UserLoginFailureModel |
InfinispanUserSessionProvider.addUserLoginFailure(RealmModel realm,
String userId) |
AuthenticatedClientSessionModel |
InfinispanUserSessionProvider.createClientSession(RealmModel realm,
ClientModel client,
UserSessionModel userSession) |
RootAuthenticationSessionModel |
InfinispanAuthenticationSessionProvider.createRootAuthenticationSession(RealmModel realm) |
RootAuthenticationSessionModel |
InfinispanAuthenticationSessionProvider.createRootAuthenticationSession(String id,
RealmModel realm) |
UserSessionModel |
InfinispanUserSessionProvider.createUserSession(RealmModel realm,
UserModel user,
String loginUsername,
String ipAddress,
String authMethod,
boolean rememberMe,
String brokerSessionId,
String brokerUserId) |
UserSessionModel |
InfinispanUserSessionProvider.createUserSession(String id,
RealmModel realm,
UserModel user,
String loginUsername,
String ipAddress,
String authMethod,
boolean rememberMe,
String brokerSessionId,
String brokerUserId) |
Map<String,Long> |
InfinispanUserSessionProvider.getActiveClientSessionStats(RealmModel realm,
boolean offline) |
long |
InfinispanUserSessionProvider.getActiveUserSessions(RealmModel realm,
ClientModel client) |
long |
InfinispanUserSessionProvider.getOfflineSessionsCount(RealmModel realm,
ClientModel client) |
UserSessionAdapter |
InfinispanUserSessionProvider.getOfflineUserSession(RealmModel realm,
String userSessionId) |
List<UserSessionModel> |
InfinispanUserSessionProvider.getOfflineUserSessions(RealmModel realm,
ClientModel client,
int first,
int max) |
List<UserSessionModel> |
InfinispanUserSessionProvider.getOfflineUserSessions(RealmModel realm,
UserModel user) |
RootAuthenticationSessionModel |
InfinispanAuthenticationSessionProvider.getRootAuthenticationSession(RealmModel realm,
String authenticationSessionId) |
UserLoginFailureModel |
InfinispanUserSessionProvider.getUserLoginFailure(RealmModel realm,
String userId) |
UserSessionModel |
InfinispanUserSessionProvider.getUserSession(RealmModel realm,
String id) |
protected UserSessionAdapter |
InfinispanUserSessionProvider.getUserSession(RealmModel realm,
String id,
boolean offline) |
UserSessionModel |
InfinispanUserSessionProvider.getUserSessionByBrokerSessionId(RealmModel realm,
String brokerSessionId) |
List<UserSessionModel> |
InfinispanUserSessionProvider.getUserSessionByBrokerUserId(RealmModel realm,
String brokerUserId) |
protected List<UserSessionModel> |
InfinispanUserSessionProvider.getUserSessionModels(RealmModel realm,
int firstResult,
int maxResults,
boolean offline,
UserSessionPredicate predicate) |
List<UserSessionModel> |
InfinispanUserSessionProvider.getUserSessions(RealmModel realm,
ClientModel client) |
List<UserSessionModel> |
InfinispanUserSessionProvider.getUserSessions(RealmModel realm,
ClientModel client,
int firstResult,
int maxResults) |
protected List<UserSessionModel> |
InfinispanUserSessionProvider.getUserSessions(RealmModel realm,
ClientModel client,
int firstResult,
int maxResults,
boolean offline) |
protected List<UserSessionModel> |
InfinispanUserSessionProvider.getUserSessions(RealmModel realm,
Predicate<Map.Entry<String,SessionEntityWrapper<UserSessionEntity>>> predicate,
boolean offline) |
List<UserSessionModel> |
InfinispanUserSessionProvider.getUserSessions(RealmModel realm,
UserModel user) |
protected long |
InfinispanUserSessionProvider.getUserSessionsCount(RealmModel realm,
ClientModel client,
boolean offline) |
UserSessionModel |
InfinispanUserSessionProvider.getUserSessionWithPredicate(RealmModel realm,
String id,
boolean offline,
Predicate<UserSessionModel> predicate) |
void |
InfinispanUserSessionProvider.onClientRemoved(RealmModel realm,
ClientModel client) |
void |
InfinispanAuthenticationSessionProvider.onClientRemoved(RealmModel realm,
ClientModel client) |
void |
InfinispanUserSessionProvider.onRealmRemoved(RealmModel realm) |
void |
InfinispanAuthenticationSessionProvider.onRealmRemoved(RealmModel realm) |
protected void |
InfinispanUserSessionProvider.onUserRemoved(RealmModel realm,
UserModel user) |
void |
InfinispanUserSessionProvider.removeAllUserLoginFailures(RealmModel realm) |
void |
InfinispanUserSessionProvider.removeExpired(RealmModel realm) |
void |
InfinispanAuthenticationSessionProvider.removeExpired(RealmModel realm) |
void |
InfinispanUserSessionProvider.removeOfflineUserSession(RealmModel realm,
UserSessionModel userSession) |
void |
InfinispanAuthenticationSessionProvider.removeRootAuthenticationSession(RealmModel realm,
RootAuthenticationSessionModel authenticationSession) |
void |
InfinispanUserSessionProvider.removeUserLoginFailure(RealmModel realm,
String userId) |
void |
InfinispanUserSessionProvider.removeUserSession(RealmModel realm,
UserSessionModel session) |
void |
InfinispanUserSessionProvider.removeUserSessions(RealmModel realm) |
void |
InfinispanUserSessionProvider.removeUserSessions(RealmModel realm,
UserModel user) |
protected void |
InfinispanUserSessionProvider.removeUserSessions(RealmModel realm,
UserModel user,
boolean offline) |
void |
RootAuthenticationSessionAdapter.restartSession(RealmModel realm) |
void |
UserSessionAdapter.restartSession(RealmModel realm,
UserModel user,
String loginUsername,
String ipAddress,
String authMethod,
boolean rememberMe,
String brokerSessionId,
String brokerUserId) |
static Consumers.UserSessionModelsConsumer |
Consumers.userSessionModels(InfinispanUserSessionProvider provider,
RealmModel realm,
boolean offline) |
Constructor and Description |
---|
RootAuthenticationSessionAdapter(KeycloakSession session,
InfinispanAuthenticationSessionProvider provider,
org.infinispan.Cache<String,RootAuthenticationSessionEntity> cache,
RealmModel realm,
RootAuthenticationSessionEntity entity) |
UserSessionAdapter(KeycloakSession session,
InfinispanUserSessionProvider provider,
InfinispanChangelogBasedTransaction<String,UserSessionEntity> userSessionUpdateTx,
InfinispanChangelogBasedTransaction<UUID,AuthenticatedClientSessionEntity> clientSessionUpdateTx,
RealmModel realm,
UserSessionEntity entity,
boolean offline) |
Modifier and Type | Method and Description |
---|---|
void |
InfinispanChangelogBasedTransaction.reloadEntityInCurrentTransaction(RealmModel realm,
K key,
SessionEntityWrapper<V> entity) |
Modifier and Type | Method and Description |
---|---|
SessionUpdateTask.CrossDCMessageStatus |
CrossDCLastSessionRefreshChecker.shouldSaveClientSessionToRemoteCache(KeycloakSession kcSession,
RealmModel realm,
SessionEntityWrapper<AuthenticatedClientSessionEntity> sessionWrapper,
UserSessionModel userSession,
boolean offline,
int newTimestamp) |
SessionUpdateTask.CrossDCMessageStatus |
CrossDCLastSessionRefreshChecker.shouldSaveUserSessionToRemoteCache(KeycloakSession kcSession,
RealmModel realm,
SessionEntityWrapper<UserSessionEntity> sessionWrapper,
boolean offline,
int newLastSessionRefresh) |
Modifier and Type | Method and Description |
---|---|
long |
RemoteCacheInvoker.MaxIdleTimeLoader.getMaxIdleTimeMs(RealmModel realm) |
<K,V extends SessionEntity> |
RemoteCacheInvoker.runTask(KeycloakSession kcSession,
RealmModel realm,
String cacheName,
K key,
SessionUpdateTask<V> task,
SessionEntityWrapper<V> sessionWrapper) |
Modifier and Type | Method and Description |
---|---|
static void |
DefaultRequiredActions.addActions(RealmModel realm) |
static void |
DefaultRoles.addDefaultRoles(RealmModel realm,
UserModel userModel) |
static void |
DefaultAuthenticationFlows.addFlows(RealmModel realm) |
static void |
DefaultAuthenticationFlows.addIdentityProviderAuthenticator(RealmModel realm,
String defaultProvider) |
static void |
DefaultRequiredActions.addUpdateLocaleAction(RealmModel realm) |
static void |
DefaultAuthenticationFlows.browserFlow(RealmModel realm) |
static void |
DefaultAuthenticationFlows.browserFlow(RealmModel realm,
boolean migrate) |
static void |
DefaultAuthenticationFlows.clientAuthFlow(RealmModel realm) |
static ComponentModel |
RepresentationToModel.convertFedMapperToComponent(RealmModel realm,
ComponentModel parent,
UserFederationMapperRepresentation rep,
String newMapperType) |
static void |
DefaultKeyProviders.createAesProvider(RealmModel realm) |
static ClientModel |
RepresentationToModel.createClient(KeycloakSession session,
RealmModel realm,
ClientRepresentation resourceRep,
boolean addDefaultRoles)
Does not create scope or role mappings!
|
static ClientModel |
KeycloakModelUtils.createClient(RealmModel realm,
String name) |
static ClientScopeModel |
RepresentationToModel.createClientScope(KeycloakSession session,
RealmModel realm,
ClientScopeRepresentation resourceRep) |
static void |
RepresentationToModel.createClientScopeMappings(RealmModel realm,
ClientModel clientModel,
List<ScopeMappingRepresentation> mappings) |
static void |
RepresentationToModel.createCredentials(UserRepresentation userRep,
KeycloakSession session,
RealmModel realm,
UserModel user,
boolean adminRequest) |
static void |
DefaultClientScopes.createDefaultClientScopes(KeycloakSession session,
RealmModel realm,
boolean addScopesToExistingClients) |
static void |
RepresentationToModel.createFederatedClientRoleMappings(UserFederatedStorageProvider federatedStorage,
RealmModel realm,
ClientModel clientModel,
UserRepresentation userRep,
List<String> roleNames) |
static void |
RepresentationToModel.createFederatedIdentities(UserRepresentation userRep,
KeycloakSession session,
RealmModel realm,
UserModel user) |
static void |
RepresentationToModel.createFederatedRoleMappings(UserFederatedStorageProvider federatedStorage,
UserRepresentation userRep,
RealmModel realm) |
static void |
RepresentationToModel.createGroups(UserRepresentation userRep,
RealmModel newRealm,
UserModel user) |
static void |
DefaultClientScopes.createOfflineAccessClientScope(RealmModel newRealm,
RoleModel offlineRole) |
static void |
DefaultKeyProviders.createProviders(RealmModel realm) |
static void |
DefaultKeyProviders.createProviders(RealmModel realm,
String privateKeyPem,
String certificatePem) |
static void |
RepresentationToModel.createRole(RealmModel newRealm,
RoleRepresentation roleRep) |
static void |
RepresentationToModel.createRoleMappings(UserRepresentation userRep,
UserModel user,
RealmModel realm) |
static void |
DefaultKeyProviders.createSecretProvider(RealmModel realm) |
static UserModel |
RepresentationToModel.createUser(KeycloakSession session,
RealmModel newRealm,
UserRepresentation userRep) |
static void |
KeycloakModelUtils.deepFindAuthenticationExecutions(RealmModel realm,
AuthenticationFlowModel flow,
List<AuthenticationExecutionModel> result)
Recursively find all AuthenticationExecutionModel from specified flow or all it's subflows
|
static void |
DefaultAuthenticationFlows.directGrantFlow(RealmModel realm,
boolean migrate) |
static void |
DefaultAuthenticationFlows.dockerAuthenticationFlow(RealmModel realm) |
static void |
ModelToRepresentation.exportAuthenticationFlows(RealmModel realm,
RealmRepresentation rep) |
static void |
ModelToRepresentation.exportGroups(RealmModel realm,
RealmRepresentation rep) |
static void |
ModelToRepresentation.exportRequiredActions(RealmModel realm,
RealmRepresentation rep) |
static ClientScopeModel |
KeycloakModelUtils.findClientScopeById(RealmModel realm,
ClientModel client,
String clientScopeId)
Lookup clientScope OR client by id.
|
static GroupModel |
KeycloakModelUtils.findGroupByPath(RealmModel realm,
String path) |
static UserModel |
KeycloakModelUtils.findUserByNameOrEmail(KeycloakSession session,
RealmModel realm,
String username)
Try to find user by username or email for authentication
|
static UserStorageProviderModel |
KeycloakModelUtils.findUserStorageProviderById(String fedProviderId,
RealmModel realm) |
static UserStorageProviderModel |
KeycloakModelUtils.findUserStorageProviderByName(String displayName,
RealmModel realm) |
static void |
DefaultAuthenticationFlows.firstBrokerLoginFlow(RealmModel realm,
boolean migrate) |
static ClientScopeModel |
KeycloakModelUtils.getClientScopeByName(RealmModel realm,
String clientScopeName) |
static Set<RoleModel> |
DefaultRoles.getDefaultRoles(RealmModel realm) |
static int |
RealmInfoUtil.getDettachedClientSessionLifespan(RealmModel realm) |
static RoleModel |
KeycloakModelUtils.getRoleFromString(RealmModel realm,
String roleName) |
static ClientModel |
SystemClientUtil.getSystemClient(RealmModel realm) |
protected static boolean |
DefaultKeyProviders.hasProvider(RealmModel realm,
String providerId) |
static void |
DefaultAuthenticationFlows.httpChallengeFlow(RealmModel realm) |
static Map<String,String> |
RepresentationToModel.importAuthenticationFlows(RealmModel newRealm,
RealmRepresentation rep) |
protected static void |
RepresentationToModel.importComponents(RealmModel newRealm,
MultivaluedHashMap<String,ComponentExportRepresentation> components,
String parentId) |
static void |
RepresentationToModel.importFederatedUser(KeycloakSession session,
RealmModel newRealm,
UserRepresentation userRep) |
static void |
RepresentationToModel.importGroup(RealmModel realm,
GroupModel parent,
GroupRepresentation group) |
static void |
RepresentationToModel.importGroups(RealmModel realm,
RealmRepresentation rep) |
static void |
RepresentationToModel.importRealm(KeycloakSession session,
RealmRepresentation rep,
RealmModel newRealm,
boolean skipUserDependent) |
static void |
RepresentationToModel.importRealmAuthorizationSettings(RealmRepresentation rep,
RealmModel newRealm,
KeycloakSession session) |
static void |
RepresentationToModel.importRoles(RolesRepresentation realmRoles,
RealmModel realm) |
static void |
RepresentationToModel.importUserFederationProvidersAndMappers(KeycloakSession session,
RealmRepresentation rep,
RealmModel newRealm) |
static boolean |
KeycloakModelUtils.isClientScopeUsed(RealmModel realm,
ClientScopeModel clientScope) |
static boolean |
KeycloakModelUtils.isFlowUsed(RealmModel realm,
AuthenticationFlowModel model)
Check to see if a flow is currently in use
|
static void |
DefaultAuthenticationFlows.migrateFlows(RealmModel realm) |
static void |
ComponentUtil.notifyCreated(KeycloakSession session,
RealmModel realm,
ComponentModel model) |
static void |
ComponentUtil.notifyPreRemove(KeycloakSession session,
RealmModel realm,
ComponentModel model) |
static void |
ComponentUtil.notifyUpdated(KeycloakSession session,
RealmModel realm,
ComponentModel oldModel,
ComponentModel newModel) |
static void |
DefaultAuthenticationFlows.registrationFlow(RealmModel realm) |
static void |
RepresentationToModel.renameRealm(RealmModel realm,
String name) |
static void |
DefaultAuthenticationFlows.resetCredentialsFlow(RealmModel realm) |
static void |
DefaultAuthenticationFlows.samlEcpProfile(RealmModel realm) |
static List<GroupRepresentation> |
ModelToRepresentation.searchForGroupByName(RealmModel realm,
boolean full,
String search,
Integer first,
Integer max) |
static void |
KeycloakModelUtils.setupAuthorizationServices(RealmModel realm) |
static RoleModel |
KeycloakModelUtils.setupOfflineRole(RealmModel realm) |
static RealmEventsConfigRepresentation |
ModelToRepresentation.toEventsConfigReprensetation(RealmModel realm) |
static List<GroupRepresentation> |
ModelToRepresentation.toGroupHierarchy(RealmModel realm,
boolean full) |
static List<GroupRepresentation> |
ModelToRepresentation.toGroupHierarchy(RealmModel realm,
boolean full,
Integer first,
Integer max) |
static AuthenticationExecutionModel |
RepresentationToModel.toModel(RealmModel realm,
AuthenticationExecutionRepresentation rep) |
static IdentityProviderModel |
RepresentationToModel.toModel(RealmModel realm,
IdentityProviderRepresentation representation,
KeycloakSession session) |
static UserConsentModel |
RepresentationToModel.toModel(RealmModel newRealm,
UserConsentRepresentation consentRep) |
static UserRepresentation |
ModelToRepresentation.toRepresentation(KeycloakSession session,
RealmModel realm,
UserModel user) |
static AuthenticationExecutionExportRepresentation |
ModelToRepresentation.toRepresentation(RealmModel realm,
AuthenticationExecutionModel model) |
static AuthenticationFlowRepresentation |
ModelToRepresentation.toRepresentation(RealmModel realm,
AuthenticationFlowModel model) |
static RealmRepresentation |
ModelToRepresentation.toRepresentation(RealmModel realm,
boolean internal) |
static IdentityProviderRepresentation |
ModelToRepresentation.toRepresentation(RealmModel realm,
IdentityProviderModel identityProviderModel) |
static void |
RepresentationToModel.updateRealm(RealmRepresentation rep,
RealmModel realm,
KeycloakSession session) |
Modifier and Type | Method and Description |
---|---|
void |
ClientsPartialImport.create(RealmModel realm,
KeycloakSession session,
ClientRepresentation clientRep) |
void |
GroupsPartialImport.create(RealmModel realm,
KeycloakSession session,
GroupRepresentation groupRep) |
void |
IdentityProvidersPartialImport.create(RealmModel realm,
KeycloakSession session,
IdentityProviderRepresentation idpRep) |
void |
RealmRolesPartialImport.create(RealmModel realm,
KeycloakSession session,
RoleRepresentation roleRep) |
abstract void |
AbstractPartialImport.create(RealmModel realm,
KeycloakSession session,
T resourceRep) |
void |
UsersPartialImport.create(RealmModel realm,
KeycloakSession session,
UserRepresentation user) |
void |
ClientRolesPartialImport.deleteRole(RealmModel realm,
String clientId,
RoleRepresentation roleRep) |
PartialImportResults |
RolesPartialImport.doImport(PartialImportRepresentation rep,
RealmModel realm,
KeycloakSession session) |
PartialImportResults |
PartialImport.doImport(PartialImportRepresentation rep,
RealmModel realm,
KeycloakSession session)
Create (or re-create) all the imported resources.
|
PartialImportResults |
AbstractPartialImport.doImport(PartialImportRepresentation partialImportRep,
RealmModel realm,
KeycloakSession session) |
boolean |
ClientsPartialImport.exists(RealmModel realm,
KeycloakSession session,
ClientRepresentation clientRep) |
boolean |
GroupsPartialImport.exists(RealmModel realm,
KeycloakSession session,
GroupRepresentation groupRep) |
boolean |
IdentityProvidersPartialImport.exists(RealmModel realm,
KeycloakSession session,
IdentityProviderRepresentation idpRep) |
boolean |
RealmRolesPartialImport.exists(RealmModel realm,
KeycloakSession session,
RoleRepresentation roleRep) |
boolean |
ClientRolesPartialImport.exists(RealmModel realm,
KeycloakSession session,
String clientId,
RoleRepresentation roleRep) |
abstract boolean |
AbstractPartialImport.exists(RealmModel realm,
KeycloakSession session,
T resourceRep) |
boolean |
UsersPartialImport.exists(RealmModel realm,
KeycloakSession session,
UserRepresentation user) |
String |
ClientsPartialImport.existsMessage(RealmModel realm,
ClientRepresentation clientRep) |
String |
GroupsPartialImport.existsMessage(RealmModel realm,
GroupRepresentation groupRep) |
String |
IdentityProvidersPartialImport.existsMessage(RealmModel realm,
IdentityProviderRepresentation idpRep) |
String |
RealmRolesPartialImport.existsMessage(RealmModel realm,
RoleRepresentation roleRep) |
abstract String |
AbstractPartialImport.existsMessage(RealmModel realm,
T resourceRep) |
String |
UsersPartialImport.existsMessage(RealmModel realm,
UserRepresentation user) |
String |
ClientsPartialImport.getModelId(RealmModel realm,
KeycloakSession session,
ClientRepresentation clientRep) |
String |
GroupsPartialImport.getModelId(RealmModel realm,
KeycloakSession session,
GroupRepresentation groupRep) |
String |
IdentityProvidersPartialImport.getModelId(RealmModel realm,
KeycloakSession session,
IdentityProviderRepresentation idpRep) |
String |
RealmRolesPartialImport.getModelId(RealmModel realm,
KeycloakSession session,
RoleRepresentation roleRep) |
abstract String |
AbstractPartialImport.getModelId(RealmModel realm,
KeycloakSession session,
T resourceRep) |
String |
UsersPartialImport.getModelId(RealmModel realm,
KeycloakSession session,
UserRepresentation user) |
String |
ClientRolesPartialImport.getModelId(RealmModel realm,
String clientId) |
void |
RolesPartialImport.prepare(PartialImportRepresentation rep,
RealmModel realm,
KeycloakSession session) |
void |
PartialImport.prepare(PartialImportRepresentation rep,
RealmModel realm,
KeycloakSession session)
Find which resources will need to be skipped or overwritten.
|
void |
ClientRolesPartialImport.prepare(PartialImportRepresentation partialImportRep,
RealmModel realm,
KeycloakSession session) |
void |
AbstractPartialImport.prepare(PartialImportRepresentation partialImportRep,
RealmModel realm,
KeycloakSession session) |
void |
ClientsPartialImport.remove(RealmModel realm,
KeycloakSession session,
ClientRepresentation clientRep) |
void |
GroupsPartialImport.remove(RealmModel realm,
KeycloakSession session,
GroupRepresentation groupRep) |
void |
IdentityProvidersPartialImport.remove(RealmModel realm,
KeycloakSession session,
IdentityProviderRepresentation idpRep) |
void |
RealmRolesPartialImport.remove(RealmModel realm,
KeycloakSession session,
RoleRepresentation roleRep) |
abstract void |
AbstractPartialImport.remove(RealmModel realm,
KeycloakSession session,
T resourceRep) |
void |
UsersPartialImport.remove(RealmModel realm,
KeycloakSession session,
UserRepresentation user) |
void |
RolesPartialImport.removeOverwrites(RealmModel realm,
KeycloakSession session) |
void |
PartialImport.removeOverwrites(RealmModel realm,
KeycloakSession session)
Delete resources that will be overwritten.
|
void |
AbstractPartialImport.removeOverwrites(RealmModel realm,
KeycloakSession session) |
Constructor and Description |
---|
PartialImportManager(PartialImportRepresentation rep,
KeycloakSession session,
RealmModel realm,
AdminEventBuilder adminEvent) |
RoleHelper(RealmModel realm) |
Modifier and Type | Method and Description |
---|---|
PolicyError |
UpperCasePasswordPolicyProvider.validate(RealmModel realm,
UserModel user,
String password) |
PolicyError |
SpecialCharsPasswordPolicyProvider.validate(RealmModel realm,
UserModel user,
String password) |
PolicyError |
RegexPatternsPasswordPolicyProvider.validate(RealmModel realm,
UserModel user,
String password) |
PolicyError |
PasswordPolicyManagerProvider.validate(RealmModel realm,
UserModel user,
String password) |
PolicyError |
NotUsernamePasswordPolicyProvider.validate(RealmModel realm,
UserModel user,
String password) |
PolicyError |
LowerCasePasswordPolicyProvider.validate(RealmModel realm,
UserModel user,
String password) |
PolicyError |
LengthPasswordPolicyProvider.validate(RealmModel realm,
UserModel user,
String password) |
PolicyError |
HistoryPasswordPolicyProvider.validate(RealmModel realm,
UserModel user,
String password) |
PolicyError |
HashIterationsPasswordPolicyProviderFactory.validate(RealmModel realm,
UserModel user,
String password) |
PolicyError |
HashAlgorithmPasswordPolicyProviderFactory.validate(RealmModel realm,
UserModel user,
String password) |
PolicyError |
ForceExpiredPasswordPolicyProviderFactory.validate(RealmModel realm,
UserModel user,
String password) |
PolicyError |
DigitsPasswordPolicyProvider.validate(RealmModel realm,
UserModel user,
String password) |
PolicyError |
DefaultPasswordPolicyManagerProvider.validate(RealmModel realm,
UserModel user,
String password) |
PolicyError |
BlacklistPasswordPolicyProvider.validate(RealmModel realm,
UserModel user,
String password) |
PolicyError |
PasswordPolicyProvider.validate(RealmModel realm,
UserModel user,
String password) |
Modifier and Type | Field and Description |
---|---|
protected RealmModel |
AuthorizationEndpointBase.realm |
Modifier and Type | Method and Description |
---|---|
protected void |
AbstractLoginProtocolFactory.addDefaultClientScopes(RealmModel realm,
ClientModel newClient) |
protected void |
AbstractLoginProtocolFactory.addDefaultClientScopes(RealmModel realm,
List<ClientModel> newClients) |
void |
LoginProtocolFactory.createDefaultClientScopes(RealmModel newRealm,
boolean addScopesToExistingClients)
Called when new realm is created
|
void |
AbstractLoginProtocolFactory.createDefaultClientScopes(RealmModel newRealm,
boolean addScopesToExistingClients) |
protected abstract void |
AbstractLoginProtocolFactory.createDefaultClientScopesImpl(RealmModel newRealm)
Impl should create default client scopes.
|
Object |
LoginProtocolFactory.createProtocolEndpoint(RealmModel realm,
EventBuilder event) |
static void |
RestartLoginCookie.expireRestartCookie(RealmModel realm,
ClientConnection connection,
javax.ws.rs.core.UriInfo uriInfo) |
javax.ws.rs.core.Response |
ClientInstallationProvider.generateInstallation(KeycloakSession session,
RealmModel realm,
ClientModel client,
URI serverBaseUri) |
static AuthenticationSessionModel |
RestartLoginCookie.restartSession(KeycloakSession session,
RealmModel realm,
RootAuthenticationSessionModel rootSession,
String expectedClientId) |
default boolean |
LoginProtocol.sendPushRevocationPolicyRequest(RealmModel realm,
ClientModel resource,
int notBefore,
String managementUrl)
Send not-before revocation policy to the given client.
|
LoginProtocol |
LoginProtocol.setRealm(RealmModel realm) |
static void |
RestartLoginCookie.setRestartCookie(KeycloakSession session,
RealmModel realm,
ClientConnection connection,
javax.ws.rs.core.UriInfo uriInfo,
AuthenticationSessionModel authSession) |
default void |
ProtocolMapper.validateConfig(KeycloakSession session,
RealmModel realm,
ProtocolMapperContainerModel client,
ProtocolMapperModel mapperModel)
Called when instance of mapperModel is created/updated for this protocolMapper through admin endpoint
|
Constructor and Description |
---|
AuthorizationEndpointBase(RealmModel realm,
EventBuilder event) |
Modifier and Type | Method and Description |
---|---|
boolean |
DockerAuthenticator.configuredFor(KeycloakSession session,
RealmModel realm,
UserModel user) |
protected void |
DockerAuthV2ProtocolFactory.createDefaultClientScopesImpl(RealmModel newRealm) |
Object |
DockerAuthV2ProtocolFactory.createProtocolEndpoint(RealmModel realm,
EventBuilder event) |
protected void |
DockerAuthenticator.notValidCredentialsAction(AuthenticationFlowContext context,
RealmModel realm,
UserModel user) |
protected void |
DockerAuthenticator.
|