Admin2: Fine Grained permissions/policies are ignored
See original GitHub issueDescribe the bug
I’ve recently migrated from 16.x to 19.0.1 using the legacy wildly non-quarkus distribution provided using the legacy keycloak operator.
It seems that our fined grained permissions are no longer applicable when using the default admin2 web UI, as users can now list users in a group but not view their settings.
Of course adding the view-users
client role is way too permissive and not acceptable. Since no backend request is being made (no XHR) and of course clearing all cookies, local and session storage the issue remains.
The only workaround I have found is simply to disable admin2 UI (too bad, it seemed snappy)
Version
19.0.1
Expected behavior
I expect the UI to provide the same functionality as the old UI, allowing users to manage with the view-members
group permission and corresponding policy to be able to view user info.
Actual behavior
See attached screenshot
How to Reproduce?
- Activate fine grained authorization
- Create a group policy
- Create a group permission to the group resource with scopes
view
,manage-members
,manage-membership
andview-members
with the corresponding policy and make it unicamous. - Test that a user with the appropriate role and permission can view members using the old UI
- Verify that using the new UI it doesn’t work anymore
Anything else?
No response
Issue Analytics
- State:
- Created a year ago
- Comments:8 (5 by maintainers)
Top GitHub Comments
Created new issue here: #3141
@ssilvert Sorry for the delay (holiday weekend here in France)… I’ll try to test within the week… However as @tkautenburger pointed out, our multitenancy uses groups and fine-grained authz and if our users are unable to create users but just assign them roles, the new reactive UI will be a showstopper for that as well. But I’ll try to deploy your fix (I still need to build keycloak and package it as a dockerfile since we’re using the operator) and validate your PR. Thanks!