-
Feature Request
-
Resolution: Done
-
Major
-
7.11.1.GA
-
False
-
False
-
Release Notes
-
-
-
-
-
-
CR1
-
+
-
https://github.com/kiegroup/droolsjbpm-integration/pull/2750, https://github.com/kiegroup/droolsjbpm-knowledge/pull/596, https://github.com/kiegroup/droolsjbpm-knowledge/pull/606, https://github.com/kiegroup/droolsjbpm-integration/pull/2819, https://github.com/kiegroup/droolsjbpm-knowledge/pull/607, https://github.com/kiegroup/droolsjbpm-integration/pull/2820
-
-
2022 Week 11-13 (from Mar 14), 2022 Week 14-16 (from Apr 4), 2022 Week 17-19 (from Apr 25), 2022 Week 20-22 (from May 16), 2022 Week 23-25 (from Jun 6), 2022 Week 26-28 (from Jun 27), 2022 Week 29-31 (from Jul 18)
The Spring Boot / SSO configuration:
and the default Spring Identity Provider/Callback:
suffers from the same defect as described into RHPAM-4087.
We assume that the fix would mean to enhance SpringSecurityUserGroupCallback to pass userId to the pluggable identity providers, such as: KeycloakIdentityProvider, and SpringSecurityIdentityProvider.
Note. The steps to reproduce it, are the same fully described into the original Jira RHPAM-4087, but change the callback from "JAASUserGroupCallbackImpl" to "SpringSecurityUserGroupCallback"
- is cloned by
-
JBPM-10045 Incorrect response for REST service when "org.kie.server.bypass.auth.user" used with Spring Boot Runtime
- Resolved
- relates to
-
RHPAM-4136 Incorrect groups are returned when "org.kie.server.bypass.auth.user" is set and JAASUserGroupCallbackImpl is used
- Closed