Uploaded image for project: 'Keycloak'
  1. Keycloak
  2. KEYCLOAK-18916

Do not consider empty values when checking read-only attributes

    XMLWordPrintable

Details

    • Hide
      • Enable user profile
      • Add two attributes to the user profile configuration: foo and bar
      • Set write permissions to admin for attribute foo
      • Update the attribute foo with any value at the user details page
      • Remove foo from the user profile configuration
      • Try to update the user at the user details page by changing the first name or any other field.
      Show
      Enable user profile Add two attributes to the user profile configuration: foo and bar Set write permissions to admin for attribute foo Update the attribute foo with any value at the user details page Remove foo from the user profile configuration Try to update the user at the user details page by changing the first name or any other field.
    • Workaround Exists
    • Hide

      Make sure attribute bar is set with any value.

      Show
      Make sure attribute bar is set with any value.
    • Undefined
    • NEW
    • NEW

    Description

      Currently, when updating a user attribute that is marked as read-only for administrators and the value is an empty string, a validation error will happen if the user is not yet set with the attribute.

      Although the validation is correct because the attribute can not be set under any circumstance, the admin console sends the attribute value as an empty string when not set.

      It should be safer to just ignore empty attributes if the attribute is not yet set to the user.

      This issue should enhance migration to the user profile so that new attributes added to the configuration do not block users from being updated due to read-only attributes in case the admin does not have write permissions.

      Attachments

        Activity

          Public project attachment banner

            context keys: [headless, issue, helper, isAsynchronousRequest, project, action, user]
            current Project key: KEYCLOAK

            People

              psilva@redhat.com Pedro Igor Craveiro
              psilva@redhat.com Pedro Igor Craveiro
              Votes:
              0 Vote for this issue
              Watchers:
              1 Start watching this issue

              Dates

                Created:
                Updated:
                Resolved: