Highlights
Send Reset Email force login again for federated users after reset credentials
In version 26.1.1 a new configuration option was added to the reset-credential-email
(Send Reset Email) authenticator to allow changing the default behavior after the reset credentials flow. Now the option force-login
(Force login after reset) is adding a third configuration value only-federated
, which means that the force login is true for federated users and false for the internal database users. The new behavior is now the default. This way all users managed by user federation providers, whose implementation can be not so tightly integrated with Keycloak, are forced to login again after the reset credentials flow to avoid any issue. This change in behavior is due to the secure by default policy.
For more information, see Enable forgot password.
Upgrading
Before upgrading refer to the migration guide for a complete list of changes.
All resolved issues
Bugs
- #32535 Invalid migration export for empty database
core
- #36405 Redirect after linking account
account/ui
- #36527 Viewing user events requires `view-realm`-role
admin/ui
- #36585 Keycloak user attribute key broken in Keycloak 26.1.0
admin/ui
- #36703 When linking IDP to an organization hide on login sets as off
admin/ui
- #36709 SAML2 Client Signing Keys Config does not accept PEM import
admin/ui
- #36842 Comboxes do not display selected option after reset
admin/ui
- #36927 MeterFilter is configured after a Meter has been registered
dist/quarkus
- #36965 CVE-2025-0736 Error during JGroups channel creation may reveal secure information
- #36985 Admin console: unable to edit user profile attribute either on the form or the JSON editor.
admin/ui
- #37029 CI fails with "Problem creating zip: Execution exception: Java heap space"
ci
- #37066 Error on import of a public key (pem)
authentication
- #37128 Customized quarkus.properties for MySQL cause "Unable to find the JDBC driver (org.h2.Driver)",The server fails to start.
storage
- #37169 Wrong organization claim assignment in JWT access token
organizations
- #37207 Change default value for force-login option in reset-credential-email
authentication
- #37229 Login form can be used to determine which email addresses / usernames are in the system
login/ui
- #37268 Problems changing pre-defined user profile attributes
admin/ui
- #37285 Upgrade to latest JGroups patch version
- #37360 CVE-2024-47072 - XStream is vulnerable to a Denial of Service attack due to stack overflow from a manipulated binary input stream
- #37431 Password policies like NoUsername consider case-sensitivity
authentication
- #37434 External Link Test failing
docs
- #37577 Property Name Casing Mismatch in ProtocolMapperUtils
saml