Thanks to visit codestin.com
Credit goes to Github.com

Skip to content

Conversation

@msdaly200
Copy link
Contributor

Apply ClientAccessTypeCondition to password grant requests

Add RESOURCE_OWNER_PASSWORD_CREDENTIALS_REQUEST event handling to
ClientAccessTypeCondition for consistent policy enforcement.

Closes #45740

…rcement gap for direct access grant flows.

Signed-off-by: Marie Daly <[email protected]>
Signed-off-by: Marie Daly <[email protected]>
phantomion and others added 19 commits February 12, 2026 15:12
fix: use getSchemeSpecificPart

updating how we determine the script jar file

Signed-off-by: Steve Hawkins <[email protected]>
Co-authored-by: Konstantinos Kyriakou <[email protected]>
Closes keycloak#46100

Signed-off-by: Pedro Ruivo <[email protected]>
Co-authored-by: Pedro Ruivo <[email protected]>
tdiesler and others added 12 commits February 12, 2026 15:12
* [client-v2] Create tests for checking permissions

Closes keycloak#45975

Signed-off-by: Martin Bartoš <[email protected]>

* Simplify admin client creation, test abstraction

Signed-off-by: Martin Bartoš <[email protected]>

* Address Vasek's comments

Signed-off-by: Martin Bartoš <[email protected]>

---------

Signed-off-by: Martin Bartoš <[email protected]>
it will now be applied by default

closes: keycloak#44232

Signed-off-by: Steve Hawkins <[email protected]>
@mposolda mposolda self-assigned this Feb 12, 2026
@ahus1 ahus1 changed the title 45750 Added RESOURCE_OWNER_PASSWORD_CREDENTIALS_REQUEST - Fixes policy enforcement gap for direct access grant flows Feb 12, 2026
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Projects

None yet

Development

Successfully merging this pull request may close these issues.

client-access-type condition in Client Policy does not trigger for token request events