Chapter 5. Known Issues

5.1. Known Issues

  1. (7.1.z) SAML encrypted assertion with newlines fails during parsing
  2. No proper way to set JDBC_PING
  3. Client’s logout handling gets stuck between HTTP-POST and HTTP-Redirect
  4. (7.1.z) SAML logouts are not invalidating the sessions for all logged-in applications
  5. SAML isPassive not working with 7.0 adapter
  6. Fuse adapter: Login to Hawt.io with user without admin role
  7. "Add user federation provider" form doesn’t validate "Custom User LDAP Filter" field
  8. Disabling Authorization for a client deletes all authorization data
  9. searchForUserByUserAttribute does not filter users by realm
  10. Deleting a client with existing sessions/offline_tokens leads to Internal Server Errors
  11. MAX_LIFESPAN cache policy does not evict objects
  12. NPE when requesting .well-known URI for which no provider exists
  13. Unexpected error when creating client with existing client ID
  14. Kerberos flow is executed even when no Kerberos provider is present
  15. keycloak-nodejs-auth-utils chokes on TLS errors instead of catching them
  16. NPE fix for HttpMethod
  17. Wrong message when a temporarily disabled user requests password reset
  18. TypeError: this.reject is not a function
  19. Import of huge certificates fails
  20. Periodic sync of User Storage Provider SPI does not work
  21. Access token appears to be valid even though session has expired in the background
  22. Error when session expired and ajax request execute in Keycloak
  23. SAML IdP only imports one key from metadata
  24. Export/Import clients functionality not working as expected
  25. Unhandled ReadOnlyException in Account Management when updating user from read-only store
  26. Cannot import realm, which contains user-based authorization policy
  27. UserRemovedEvent not triggered when userStorage provider is removed
  28. Removing userSessions is very slow when removing many sessions
  29. SAML federation link fails to work with read-only LDAP user