Keycloak Admin REST API
This is a REST API reference for the Keycloak Admin
- Homepage
- https://api.apis.guru/v2/specs/keycloak.local/1.json
- Provider
- keycloak.local
- OpenAPI version
- 3.0.2
- Spec (JSON)
- https://api.apis.guru/v2/specs/keycloak.local/1/openapi.json
- Spec (YAML)
- https://api.apis.guru/v2/specs/keycloak.local/1/openapi.yaml
Tools (283)
Extracted live via the executor SDK.
-
attackDetection.deleteRealmAttackDetectionBruteForceUsersClear any user login failures for all users This can release temporary disabled users
-
attackDetection.deleteRealmAttackDetectionBruteForceUsersUserIdClear any user login failures for the user This can release temporary disabled user
-
attackDetection.getRealmAttackDetectionBruteForceUsersUserIdGet status of a username in brute force detection
-
authenticationManagement.deleteRealmAuthenticationConfigIdDelete authenticator configuration
-
authenticationManagement.deleteRealmAuthenticationExecutionsExecutionIdDelete execution
-
authenticationManagement.deleteRealmAuthenticationFlowsIdDelete an authentication flow
-
authenticationManagement.deleteRealmAuthenticationRequiredActionsAliasDelete required action
-
authenticationManagement.getRealmAuthenticationAuthenticatorProvidersGet authenticator providers Returns a list of authenticator providers.
-
authenticationManagement.getRealmAuthenticationClientAuthenticatorProvidersGet client authenticator providers Returns a list of client authenticator providers.
-
authenticationManagement.getRealmAuthenticationConfigDescriptionProviderIdGet authenticator provider’s configuration description
-
authenticationManagement.getRealmAuthenticationConfigIdGet authenticator configuration
-
authenticationManagement.getRealmAuthenticationExecutionsExecutionIdGet Single Execution
-
authenticationManagement.getRealmAuthenticationFlowsGet authentication flows Returns a list of authentication flows.
-
authenticationManagement.getRealmAuthenticationFlowsFlowAliasExecutionsGet authentication executions for a flow
-
authenticationManagement.getRealmAuthenticationFlowsIdGet authentication flow for id
-
authenticationManagement.getRealmAuthenticationFormActionProvidersGet form action providers Returns a list of form action providers.
-
authenticationManagement.getRealmAuthenticationFormProvidersGet form providers Returns a list of form providers.
-
authenticationManagement.getRealmAuthenticationPerClientConfigDescriptionGet configuration descriptions for all clients
-
authenticationManagement.getRealmAuthenticationRequiredActionsGet required actions Returns a list of required actions.
-
authenticationManagement.getRealmAuthenticationRequiredActionsAliasGet required action for alias
-
authenticationManagement.getRealmAuthenticationUnregisteredRequiredActionsGet unregistered required actions Returns a list of unregistered required actions.
-
authenticationManagement.postRealmAuthenticationExecutionsAdd new authentication execution
-
authenticationManagement.postRealmAuthenticationExecutionsExecutionIdConfigUpdate execution with new configuration
-
authenticationManagement.postRealmAuthenticationExecutionsExecutionIdLowerPriorityLower execution’s priority
-
authenticationManagement.postRealmAuthenticationExecutionsExecutionIdRaisePriorityRaise execution’s priority
-
authenticationManagement.postRealmAuthenticationFlowsCreate a new authentication flow
-
authenticationManagement.postRealmAuthenticationFlowsFlowAliasCopyCopy existing authentication flow under a new name The new name is given as 'newName' attribute of the passed JSON object
-
authenticationManagement.postRealmAuthenticationFlowsFlowAliasExecutionsExecutionAdd new authentication execution to a flow
-
authenticationManagement.postRealmAuthenticationFlowsFlowAliasExecutionsFlowAdd new flow with new execution to existing flow
-
authenticationManagement.postRealmAuthenticationRegisterRequiredActionRegister a new required actions
-
authenticationManagement.postRealmAuthenticationRequiredActionsAliasLowerPriorityLower required action’s priority
-
authenticationManagement.postRealmAuthenticationRequiredActionsAliasRaisePriorityRaise required action’s priority
-
authenticationManagement.putRealmAuthenticationConfigIdUpdate authenticator configuration
-
authenticationManagement.putRealmAuthenticationFlowsFlowAliasExecutionsUpdate authentication executions of a flow
-
authenticationManagement.putRealmAuthenticationFlowsIdUpdate an authentication flow
-
authenticationManagement.putRealmAuthenticationRequiredActionsAliasUpdate required action
-
clientAttributeCertificate.getRealmClientsIdCertificatesAttrGet key info
-
clientAttributeCertificate.postRealmClientsIdCertificatesAttrDownloadGet a keystore file for the client, containing private key and public certificate
-
clientAttributeCertificate.postRealmClientsIdCertificatesAttrGenerateGenerate a new certificate with new key pair
-
clientAttributeCertificate.postRealmClientsIdCertificatesAttrGenerateAndDownloadGenerate a new keypair and certificate, and get the private key file Generates a keypair and certificate and serves the private key in a specified keystore format.
-
clientAttributeCertificate.postRealmClientsIdCertificatesAttrUploadUpload certificate and eventually private key
-
clientAttributeCertificate.postRealmClientsIdCertificatesAttrUploadCertificateUpload only certificate, not private key
-
clientInitialAccess.deleteRealmClientsInitialAccessIdDELETE /{realm}/clients-initial-access/{id}
-
clientInitialAccess.getRealmClientsInitialAccessGET /{realm}/clients-initial-access
-
clientInitialAccess.postRealmClientsInitialAccessCreate a new initial access token.
-
clientRegistrationPolicy.getRealmClientRegistrationPolicyProvidersBase path for retrieve providers with the configProperties properly filled
-
clientRoleMappings.deleteRealmGroupsIdRoleMappingsClientsClientDelete client-level roles from user role mapping
-
clientRoleMappings.deleteRealmUsersIdRoleMappingsClientsClientDelete client-level roles from user role mapping
-
clientRoleMappings.getRealmGroupsIdRoleMappingsClientsClientGet client-level role mappings for the user, and the app
-
clientRoleMappings.getRealmGroupsIdRoleMappingsClientsClientAvailableGet available client-level roles that can be mapped to the user
-
clientRoleMappings.getRealmGroupsIdRoleMappingsClientsClientCompositeGet effective client-level role mappings This recurses any composite roles
-
clientRoleMappings.getRealmUsersIdRoleMappingsClientsClientGet client-level role mappings for the user, and the app
-
clientRoleMappings.getRealmUsersIdRoleMappingsClientsClientAvailableGet available client-level roles that can be mapped to the user
-
clientRoleMappings.getRealmUsersIdRoleMappingsClientsClientCompositeGet effective client-level role mappings This recurses any composite roles
-
clientRoleMappings.postRealmGroupsIdRoleMappingsClientsClientAdd client-level roles to the user role mapping
-
clientRoleMappings.postRealmUsersIdRoleMappingsClientsClientAdd client-level roles to the user role mapping
-
clients.deleteRealmClientsIdDelete the client
-
clients.deleteRealmClientsIdDefaultClientScopesClientScopeIdDELETE /{realm}/clients/{id}/default-client-scopes/{clientScopeId}
-
clients.deleteRealmClientsIdNodesNodeUnregister a cluster node from the client
-
clients.deleteRealmClientsIdOptionalClientScopesClientScopeIdDELETE /{realm}/clients/{id}/optional-client-scopes/{clientScopeId}
-
clients.getRealmClientsGet clients belonging to the realm Returns a list of clients belonging to the realm
-
clients.getRealmClientsIdGet representation of the client
-
clients.getRealmClientsIdClientSecretGet the client secret
-
clients.getRealmClientsIdDefaultClientScopesGet default client scopes.
-
clients.getRealmClientsIdEvaluateScopesGenerateExampleAccessTokenCreate JSON with payload of example access token
-
clients.getRealmClientsIdEvaluateScopesProtocolMappersReturn list of all protocol mappers, which will be used when generating tokens issued for particular client.
-
clients.getRealmClientsIdEvaluateScopesScopeMappingsRoleContainerIdGrantedGet effective scope mapping of all roles of particular role container, which this client is defacto allowed to have in the accessToken issued for him.
-
clients.getRealmClientsIdEvaluateScopesScopeMappingsRoleContainerIdNotGrantedGet roles, which this client doesn’t have scope for and can’t have them in the accessToken issued for him.
-
clients.getRealmClientsIdInstallationProvidersProviderIdGET /{realm}/clients/{id}/installation/providers/{providerId}
-
clients.getRealmClientsIdManagementPermissionsReturn object stating whether client Authorization permissions have been initialized or not and a reference
-
clients.getRealmClientsIdOfflineSessionCountGet application offline session count Returns a number of offline user sessions associated with this client { "count": number }
-
clients.getRealmClientsIdOfflineSessionsGet offline sessions for client Returns a list of offline user sessions associated with this client
-
clients.getRealmClientsIdOptionalClientScopesGet optional client scopes.
-
clients.getRealmClientsIdServiceAccountUserGet a user dedicated to the service account
-
clients.getRealmClientsIdSessionCountGet application session count Returns a number of user sessions associated with this client { "count": number }
-
clients.getRealmClientsIdTestNodesAvailableTest if registered cluster nodes are available Tests availability by sending 'ping' request to all cluster nodes.
-
clients.getRealmClientsIdUserSessionsGet user sessions for client Returns a list of user sessions associated with this client
-
clients.postRealmClientsCreate a new client Client’s client_id must be unique!
-
clients.postRealmClientsIdClientSecretGenerate a new secret for the client
-
clients.postRealmClientsIdNodesRegister a cluster node with the client Manually register cluster node to this client - usually it’s not needed to call this directly as adapter should handle by sending registration request to Keycloak
-
clients.postRealmClientsIdPushRevocationPush the client’s revocation policy to its admin URL If the client has an admin URL, push revocation policy to it.
-
clients.postRealmClientsIdRegistrationAccessTokenGenerate a new registration access token for the client
-
clients.putRealmClientsIdUpdate the client
-
clients.putRealmClientsIdDefaultClientScopesClientScopeIdPUT /{realm}/clients/{id}/default-client-scopes/{clientScopeId}
-
clients.putRealmClientsIdManagementPermissionsReturn object stating whether client Authorization permissions have been initialized or not and a reference
-
clients.putRealmClientsIdOptionalClientScopesClientScopeIdPUT /{realm}/clients/{id}/optional-client-scopes/{clientScopeId}
-
clientScopes.deleteRealmClientScopesIdDelete the client scope
-
clientScopes.getRealmClientScopesGet client scopes belonging to the realm Returns a list of client scopes belonging to the realm
-
clientScopes.getRealmClientScopesIdGet representation of the client scope
-
clientScopes.postRealmClientScopesCreate a new client scope Client Scope’s name must be unique!
-
clientScopes.putRealmClientScopesIdUpdate the client scope
-
component.deleteRealmComponentsIdDELETE /{realm}/components/{id}
-
component.getRealmComponentsGET /{realm}/components
-
component.getRealmComponentsIdGET /{realm}/components/{id}
-
component.getRealmComponentsIdSubComponentTypesList of subcomponent types that are available to configure for a particular parent component.
-
component.postRealmComponentsPOST /{realm}/components
-
component.putRealmComponentsIdPUT /{realm}/components/{id}
-
groups.deleteRealmGroupsIdDELETE /{realm}/groups/{id}
-
groups.getRealmGroupsGet group hierarchy.
-
groups.getRealmGroupsCountReturns the groups counts.
-
groups.getRealmGroupsIdGET /{realm}/groups/{id}
-
groups.getRealmGroupsIdManagementPermissionsReturn object stating whether client Authorization permissions have been initialized or not and a reference
-
groups.getRealmGroupsIdMembersGet users Returns a list of users, filtered according to query parameters
-
groups.postRealmGroupscreate or add a top level realm groupSet or create child.
-
groups.postRealmGroupsIdChildrenSet or create child.
-
groups.putRealmGroupsIdUpdate group, ignores subgroups.
-
groups.putRealmGroupsIdManagementPermissionsReturn object stating whether client Authorization permissions have been initialized or not and a reference
-
identityProviders.deleteRealmIdentityProviderInstancesAliasDelete the identity provider
-
identityProviders.deleteRealmIdentityProviderInstancesAliasMappersIdDelete a mapper for the identity provider
-
identityProviders.getRealmIdentityProviderInstancesGet identity providers
-
identityProviders.getRealmIdentityProviderInstancesAliasGet the identity provider
-
identityProviders.getRealmIdentityProviderInstancesAliasExportExport public broker configuration for identity provider
-
identityProviders.getRealmIdentityProviderInstancesAliasManagementPermissionsReturn object stating whether client Authorization permissions have been initialized or not and a reference
-
identityProviders.getRealmIdentityProviderInstancesAliasMappersGet mappers for identity provider
-
identityProviders.getRealmIdentityProviderInstancesAliasMappersIdGet mapper by id for the identity provider
-
identityProviders.getRealmIdentityProviderInstancesAliasMapperTypesGet mapper types for identity provider
-
identityProviders.getRealmIdentityProviderProvidersProviderIdGet identity providers
-
identityProviders.postRealmIdentityProviderImportConfigImport identity provider from uploaded JSON file
-
identityProviders.postRealmIdentityProviderInstancesCreate a new identity provider
-
identityProviders.postRealmIdentityProviderInstancesAliasMappersAdd a mapper to identity provider
-
identityProviders.putRealmIdentityProviderInstancesAliasUpdate the identity provider
-
identityProviders.putRealmIdentityProviderInstancesAliasManagementPermissionsReturn object stating whether client Authorization permissions have been initialized or not and a reference
-
identityProviders.putRealmIdentityProviderInstancesAliasMappersIdUpdate a mapper for the identity provider
-
key.getRealmKeysGET /{realm}/keys
-
protocolMappers.deleteRealmClientScopesId1ProtocolMappersModelsId2Delete the mapper
-
protocolMappers.deleteRealmClientsId1ProtocolMappersModelsId2Delete the mapper
-
protocolMappers.getRealmClientScopesId1ProtocolMappersModelsId2Get mapper by id
-
protocolMappers.getRealmClientScopesIdProtocolMappersModelsGet mappers
-
protocolMappers.getRealmClientScopesIdProtocolMappersProtocolProtocolGet mappers by name for a specific protocol
-
protocolMappers.getRealmClientsId1ProtocolMappersModelsId2Get mapper by id
-
protocolMappers.getRealmClientsIdProtocolMappersModelsGet mappers
-
protocolMappers.getRealmClientsIdProtocolMappersProtocolProtocolGet mappers by name for a specific protocol
-
protocolMappers.postRealmClientScopesIdProtocolMappersAddModelsCreate multiple mappers
-
protocolMappers.postRealmClientScopesIdProtocolMappersModelsCreate a mapper
-
protocolMappers.postRealmClientsIdProtocolMappersAddModelsCreate multiple mappers
-
protocolMappers.postRealmClientsIdProtocolMappersModelsCreate a mapper
-
protocolMappers.putRealmClientScopesId1ProtocolMappersModelsId2Update the mapper
-
protocolMappers.putRealmClientsId1ProtocolMappersModelsId2Update the mapper
-
realmsAdmin.deleteRealmDelete the realm
-
realmsAdmin.deleteRealmAdminEventsDelete all admin events
-
realmsAdmin.deleteRealmDefaultDefaultClientScopesClientScopeIdDELETE /{realm}/default-default-client-scopes/{clientScopeId}
-
realmsAdmin.deleteRealmDefaultGroupsGroupIdDELETE /{realm}/default-groups/{groupId}
-
realmsAdmin.deleteRealmDefaultOptionalClientScopesClientScopeIdDELETE /{realm}/default-optional-client-scopes/{clientScopeId}
-
realmsAdmin.deleteRealmEventsDelete all events
-
realmsAdmin.deleteRealmSessionsSessionRemove a specific user session.
-
realmsAdmin.getRealmGet the top-level representation of the realm It will not include nested information like User and Client representations.
-
realmsAdmin.getRealmAdminEventsGet admin events Returns all admin events, or filters events based on URL query parameters listed here
-
realmsAdmin.getRealmClientSessionStatsGet client session stats Returns a JSON map.
-
realmsAdmin.getRealmCredentialRegistratorsGET /{realm}/credential-registrators
-
realmsAdmin.getRealmDefaultDefaultClientScopesGet realm default client scopes.
-
realmsAdmin.getRealmDefaultGroupsGet group hierarchy.
-
realmsAdmin.getRealmDefaultOptionalClientScopesGet realm optional client scopes.
-
realmsAdmin.getRealmEventsGet events Returns all events, or filters them based on URL query parameters listed here
-
realmsAdmin.getRealmEventsConfigGet the events provider configuration Returns JSON object with events provider configuration
-
realmsAdmin.getRealmGroupByPathPathGET /{realm}/group-by-path/{path}
-
realmsAdmin.getRealmUsersManagementPermissionsGET /{realm}/users-management-permissions
-
realmsAdmin.postImport a realm Imports a realm from a full representation of that realm.
-
realmsAdmin.postRealmClearKeysCacheClear cache of external public keys (Public keys of clients or Identity providers)
-
realmsAdmin.postRealmClearRealmCacheClear realm cache
-
realmsAdmin.postRealmClearUserCacheClear user cache
-
realmsAdmin.postRealmClientDescriptionConverterBase path for importing clients under this realm.
-
realmsAdmin.postRealmLogoutAllRemoves all user sessions.
-
realmsAdmin.postRealmPartialExportPartial export of existing realm into a JSON file.
-
realmsAdmin.postRealmPartialImportPartial import from a JSON file to an existing realm.
-
realmsAdmin.postRealmPushRevocationPush the realm’s revocation policy to any client that has an admin url associated with it.
-
realmsAdmin.postRealmTestLdapConnectionTest LDAP connection
-
realmsAdmin.postRealmTestSmtpConnectionPOST /{realm}/testSMTPConnection
-
realmsAdmin.putRealmUpdate the top-level information of the realm Any user, roles or client information in the representation will be ignored.
-
realmsAdmin.putRealmDefaultDefaultClientScopesClientScopeIdPUT /{realm}/default-default-client-scopes/{clientScopeId}
-
realmsAdmin.putRealmDefaultGroupsGroupIdPUT /{realm}/default-groups/{groupId}
-
realmsAdmin.putRealmDefaultOptionalClientScopesClientScopeIdPUT /{realm}/default-optional-client-scopes/{clientScopeId}
-
realmsAdmin.putRealmEventsConfigUpdate the events provider Change the events provider and/or its configuration
-
realmsAdmin.putRealmUsersManagementPermissionsPUT /{realm}/users-management-permissions
-
roleMapper.deleteRealmGroupsIdRoleMappingsRealmDelete realm-level role mappings
-
roleMapper.deleteRealmUsersIdRoleMappingsRealmDelete realm-level role mappings
-
roleMapper.getRealmGroupsIdRoleMappingsGet role mappings
-
roleMapper.getRealmGroupsIdRoleMappingsRealmGet realm-level role mappings
-
roleMapper.getRealmGroupsIdRoleMappingsRealmAvailableGet realm-level roles that can be mapped
-
roleMapper.getRealmGroupsIdRoleMappingsRealmCompositeGet effective realm-level role mappings This will recurse all composite roles to get the result.
-
roleMapper.getRealmUsersIdRoleMappingsGet role mappings
-
roleMapper.getRealmUsersIdRoleMappingsRealmGet realm-level role mappings
-
roleMapper.getRealmUsersIdRoleMappingsRealmAvailableGet realm-level roles that can be mapped
-
roleMapper.getRealmUsersIdRoleMappingsRealmCompositeGet effective realm-level role mappings This will recurse all composite roles to get the result.
-
roleMapper.postRealmGroupsIdRoleMappingsRealmAdd realm-level role mappings to the user
-
roleMapper.postRealmUsersIdRoleMappingsRealmAdd realm-level role mappings to the user
-
roles.deleteRealmClientsIdRolesRoleNameDelete a role by name
-
roles.deleteRealmClientsIdRolesRoleNameCompositesRemove roles from the role’s composite
-
roles.deleteRealmRolesRoleNameDelete a role by name
-
roles.deleteRealmRolesRoleNameCompositesRemove roles from the role’s composite
-
roles.getRealmClientsIdRolesGet all roles for the realm or client
-
roles.getRealmClientsIdRolesRoleNameGet a role by name
-
roles.getRealmClientsIdRolesRoleNameCompositesGet composites of the role
-
roles.getRealmClientsIdRolesRoleNameCompositesClientsClientAn app-level roles for the specified app for the role’s composite
-
roles.getRealmClientsIdRolesRoleNameCompositesRealmGet realm-level roles of the role’s composite
-
roles.getRealmClientsIdRolesRoleNameGroupsReturn List of Groups that have the specified role name
-
roles.getRealmClientsIdRolesRoleNameManagementPermissionsReturn object stating whether role Authoirzation permissions have been initialized or not and a reference
-
roles.getRealmClientsIdRolesRoleNameUsersReturn List of Users that have the specified role name
-
roles.getRealmRolesGet all roles for the realm or client
-
roles.getRealmRolesRoleNameGet a role by name
-
roles.getRealmRolesRoleNameCompositesGet composites of the role
-
roles.getRealmRolesRoleNameCompositesClientsClientAn app-level roles for the specified app for the role’s composite
-
roles.getRealmRolesRoleNameCompositesRealmGet realm-level roles of the role’s composite
-
roles.getRealmRolesRoleNameGroupsReturn List of Groups that have the specified role name
-
roles.getRealmRolesRoleNameManagementPermissionsReturn object stating whether role Authoirzation permissions have been initialized or not and a reference
-
roles.getRealmRolesRoleNameUsersReturn List of Users that have the specified role name
-
roles.postRealmClientsIdRolesCreate a new role for the realm or client
-
roles.postRealmClientsIdRolesRoleNameCompositesAdd a composite to the role
-
roles.postRealmRolesCreate a new role for the realm or client
-
roles.postRealmRolesRoleNameCompositesAdd a composite to the role
-
roles.putRealmClientsIdRolesRoleNameUpdate a role by name
-
roles.putRealmClientsIdRolesRoleNameManagementPermissionsReturn object stating whether role Authoirzation permissions have been initialized or not and a reference
-
roles.putRealmRolesRoleNameUpdate a role by name
-
roles.putRealmRolesRoleNameManagementPermissionsReturn object stating whether role Authoirzation permissions have been initialized or not and a reference
-
rolesById.deleteRealmRolesByIdRoleIdDelete the role
-
rolesById.deleteRealmRolesByIdRoleIdCompositesRemove a set of roles from the role’s composite
-
rolesById.getRealmRolesByIdRoleIdGet a specific role’s representation
-
rolesById.getRealmRolesByIdRoleIdCompositesGet role’s children Returns a set of role’s children provided the role is a composite.
-
rolesById.getRealmRolesByIdRoleIdCompositesClientsClientGet client-level roles for the client that are in the role’s composite
-
rolesById.getRealmRolesByIdRoleIdCompositesRealmGet realm-level roles that are in the role’s composite
-
rolesById.getRealmRolesByIdRoleIdManagementPermissionsReturn object stating whether role Authoirzation permissions have been initialized or not and a reference
-
rolesById.postRealmRolesByIdRoleIdCompositesMake the role a composite role by associating some child roles
-
rolesById.putRealmRolesByIdRoleIdUpdate the role
-
rolesById.putRealmRolesByIdRoleIdManagementPermissionsReturn object stating whether role Authoirzation permissions have been initialized or not and a reference
-
root.getGet themes, social providers, auth providers, and event listeners available on this server
-
scopeMappings.deleteRealmClientScopesIdScopeMappingsClientsClientRemove client-level roles from the client’s scope.
-
scopeMappings.deleteRealmClientScopesIdScopeMappingsRealmRemove a set of realm-level roles from the client’s scope
-
scopeMappings.deleteRealmClientsIdScopeMappingsClientsClientRemove client-level roles from the client’s scope.
-
scopeMappings.deleteRealmClientsIdScopeMappingsRealmRemove a set of realm-level roles from the client’s scope
-
scopeMappings.getRealmClientScopesIdScopeMappingsGet all scope mappings for the client
-
scopeMappings.getRealmClientScopesIdScopeMappingsClientsClientGet the roles associated with a client’s scope Returns roles for the client.
-
scopeMappings.getRealmClientScopesIdScopeMappingsClientsClientAvailableThe available client-level roles Returns the roles for the client that can be associated with the client’s scope
-
scopeMappings.getRealmClientScopesIdScopeMappingsClientsClientCompositeGet effective client roles Returns the roles for the client that are associated with the client’s scope.
-
scopeMappings.getRealmClientScopesIdScopeMappingsRealmGet realm-level roles associated with the client’s scope
-
scopeMappings.getRealmClientScopesIdScopeMappingsRealmAvailableGet realm-level roles that are available to attach to this client’s scope
-
scopeMappings.getRealmClientScopesIdScopeMappingsRealmCompositeGet effective realm-level roles associated with the client’s scope What this does is recurse any composite roles associated with the client’s scope and adds the roles to this lists.
-
scopeMappings.getRealmClientsIdScopeMappingsGet all scope mappings for the client
-
scopeMappings.getRealmClientsIdScopeMappingsClientsClientGet the roles associated with a client’s scope Returns roles for the client.
-
scopeMappings.getRealmClientsIdScopeMappingsClientsClientAvailableThe available client-level roles Returns the roles for the client that can be associated with the client’s scope
-
scopeMappings.getRealmClientsIdScopeMappingsClientsClientCompositeGet effective client roles Returns the roles for the client that are associated with the client’s scope.
-
scopeMappings.getRealmClientsIdScopeMappingsRealmGet realm-level roles associated with the client’s scope
-
scopeMappings.getRealmClientsIdScopeMappingsRealmAvailableGet realm-level roles that are available to attach to this client’s scope
-
scopeMappings.getRealmClientsIdScopeMappingsRealmCompositeGet effective realm-level roles associated with the client’s scope What this does is recurse any composite roles associated with the client’s scope and adds the roles to this lists.
-
scopeMappings.postRealmClientScopesIdScopeMappingsClientsClientAdd client-level roles to the client’s scope
-
scopeMappings.postRealmClientScopesIdScopeMappingsRealmAdd a set of realm-level roles to the client’s scope
-
scopeMappings.postRealmClientsIdScopeMappingsClientsClientAdd client-level roles to the client’s scope
-
scopeMappings.postRealmClientsIdScopeMappingsRealmAdd a set of realm-level roles to the client’s scope
-
users.deleteRealmUsersIdDelete the user
-
users.deleteRealmUsersIdConsentsClientRevoke consent and offline tokens for particular client from user
-
users.deleteRealmUsersIdCredentialsCredentialIdRemove a credential for a user
-
users.deleteRealmUsersIdFederatedIdentityProviderRemove a social login provider from user
-
users.deleteRealmUsersIdGroupsGroupIdDELETE /{realm}/users/{id}/groups/{groupId}
-
users.getRealmUsersGet users Returns a list of users, filtered according to query parameters
-
users.getRealmUsersCountReturns the number of users that match the given criteria.
-
users.getRealmUsersIdGet representation of the user
-
users.getRealmUsersIdConfiguredUserStorageCredentialTypesReturn credential types, which are provided by the user storage where user is stored.
-
users.getRealmUsersIdConsentsGet consents granted by the user
-
users.getRealmUsersIdCredentialsGET /{realm}/users/{id}/credentials
-
users.getRealmUsersIdFederatedIdentityGet social logins associated with the user
-
users.getRealmUsersIdGroupsGET /{realm}/users/{id}/groups
-
users.getRealmUsersIdGroupsCountGET /{realm}/users/{id}/groups/count
-
users.getRealmUsersIdOfflineSessionsClientIdGet offline sessions associated with the user and client
-
users.getRealmUsersIdSessionsGet sessions associated with the user
-
users.postRealmUsersCreate a new user Username must be unique.
-
users.postRealmUsersIdCredentialsCredentialIdMoveAfterNewPreviousCredentialIdMove a credential to a position behind another credential
-
users.postRealmUsersIdCredentialsCredentialIdMoveToFirstMove a credential to a first position in the credentials list of the user
-
users.postRealmUsersIdFederatedIdentityProviderAdd a social login provider to the user
-
users.postRealmUsersIdImpersonationImpersonate the user
-
users.postRealmUsersIdLogoutRemove all user sessions associated with the user Also send notification to all clients that have an admin URL to invalidate the sessions for the particular user.
-
users.putRealmUsersIdUpdate the user
-
users.putRealmUsersIdCredentialsCredentialIdUserLabelUpdate a credential label for a user
-
users.putRealmUsersIdDisableCredentialTypesDisable all credentials for a user of a specific type
-
users.putRealmUsersIdExecuteActionsEmailSend a update account email to the user An email contains a link the user can click to perform a set of required actions.
-
users.putRealmUsersIdGroupsGroupIdPUT /{realm}/users/{id}/groups/{groupId}
-
users.putRealmUsersIdResetPasswordSet up a new password for the user.
-
users.putRealmUsersIdSendVerifyEmailSend an email-verification email to the user An email contains a link the user can click to verify their email address.
-
userStorageProvider.getIdNameNeed this for admin console to display simple name of provider when displaying client detail KEYCLOAK-4328
-
userStorageProvider.getRealmUserStorageIdNameNeed this for admin console to display simple name of provider when displaying user detail KEYCLOAK-4328
-
userStorageProvider.postRealmUserStorageIdRemoveImportedUsersRemove imported users
-
userStorageProvider.postRealmUserStorageIdSyncTrigger sync of users Action can be "triggerFullSync" or "triggerChangedUsersSync"
-
userStorageProvider.postRealmUserStorageIdUnlinkUsersUnlink imported users from a storage provider
-
userStorageProvider.postRealmUserStorageParentIdMappersIdSyncTrigger sync of mapper data related to ldap mapper (roles, groups, …) direction is "fedToKeycloak" or "keycloakToFed"
-
openapi.previewSpecPreview an OpenAPI document before adding it as a source
-
openapi.addSourceAdd an OpenAPI source and register its operations as tools