Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Inconsistency using impersonation user permission #29653

Closed
1 of 2 tasks
masalinas opened this issue May 17, 2024 · 3 comments
Closed
1 of 2 tasks

Inconsistency using impersonation user permission #29653

masalinas opened this issue May 17, 2024 · 3 comments
Assignees
Labels
area/admin/api kind/bug Categorizes a PR related to a bug team/core-iam

Comments

@masalinas
Copy link

masalinas commented May 17, 2024

Before reporting an issue

  • I have read and understood the above terms for submitting issues, and I understand that my issue may be closed without action if I do not follow them.

Area

admin/api

Describe the bug

I want to bind a user policy to the user impersonation permission withour activating the feature admin-fine-grained-authz when start a keycloak service.
The documentation said that the impersonation feature is active by default in keycloak, but if you don't activate the parameter admin-fine-grained-authz:

  • Is you tray to activate the user permissions using the Admin Console, the permissions tab is not showed in the user menu so is not possible bind any policy visually.
  • Is you tray to activate the user permissions using the Admin CLI like this:

kcadmin.sh update users-management-permissions -r poc -s enabled=true

You obtain an error like this.

For more on this error consult the server log at the debug level. [unknown_error]

This option only works when you activate the parameter admin-fine-grained-authz

Conclusion: you must to activate the parameter: admin-fine-grained-authz a Preview features if you want to use the impersonation a Supported features, so this is situation is incongruent.

Version

24.0.4

Regression

  • The issue is a regression

Expected behavior

I want to bind a user policy to the user impersonation permission without activating the parameter admin-fine-grained-authz which is a Preview features

Actual behavior

Is not possible to use the impersonation user behavior in a production environment because the admin-fine-grained-authz is not recomended to be used in this environment as keycloak comment.

How to Reproduce?

Try to activate the impersonation permissions from Admin CLI you will obtain an error, if you try to use the Admin Console not exist the tab of permissions to be activated

Anything else?

No response

@masalinas masalinas added kind/bug Categorizes a PR related to a bug status/triage labels May 17, 2024
@masalinas masalinas changed the title Incongruent using impersonation user permission Inconsistency using impersonation user permission May 21, 2024
@martin-kanis
Copy link
Contributor

@masalinas I think you are mixing two things.

  1. there is impersonation "feature" that is available to any user with impersonation role.
  2. then you have fine grain impersonation control "feature" where you have more control over who can impersonate users. This is based on admin-fine-grained-authz feature which obviously needs to be enabled

@martin-kanis martin-kanis self-assigned this Jun 7, 2024
@keycloak-github-bot keycloak-github-bot bot closed this as not planned Won't fix, can't repro, duplicate, stale Jun 7, 2024
@keycloak-github-bot
Copy link

Thanks for reporting this issue. However, after review this is not considered a valid issue, or has been recently resolved.

As the issue is not valid it will be automatically closed.

@masalinas
Copy link
Author

masalinas commented Jun 7, 2024

Ok so the stable impersonation is related to the impersonation button that exist in the Keykloak Admin UI. So to use a more detail control impersonation ypu must to use the not stable parameter admin-fine-grained-authz.

So my last question is is in the keycloak roadmap include this feature as stable feature is a short of time?

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
area/admin/api kind/bug Categorizes a PR related to a bug team/core-iam
Projects
None yet
Development

No branches or pull requests

3 participants