@Override public void setFederationLink(String link) { delegate.setFederationLink(link); }
@Override public void setFederationLink(String link) { delegate.setFederationLink(link); }
@Override public void setFederationLink(String link) { getDelegateForUpdate(); updated.setFederationLink(link); }
@Override public void setFederationLink(String link) { getDelegateForUpdate(); updated.setFederationLink(link); }
protected UserModel registerWithFederation(RealmModel realm, UserModel user) { for (UserFederationProviderModel federation : realm.getUserFederationProviders()) { UserFederationProvider fed = getFederationProvider(federation); if (fed.synchronizeRegistrations()) { user.setFederationLink(federation.getId()); UserModel registered = fed.register(realm, user); managedUsers.put(registered.getId(), registered); return registered; } } return user; }
protected UserModel importUserToKeycloak(RealmModel realm, String username) { // Just guessing email from kerberos realm String email = username + "@" + kerberosConfig.getKerberosRealm().toLowerCase(); logger.debugf("Creating kerberos user: %s, email: %s to local Keycloak storage", username, email); UserModel user = session.userLocalStorage().addUser(realm, username); user.setEnabled(true); user.setEmail(email); user.setFederationLink(model.getId()); user.setSingleAttribute(KERBEROS_PRINCIPAL, username + "@" + kerberosConfig.getKerberosRealm()); if (kerberosConfig.isUpdateProfileFirstLogin()) { user.addRequiredAction(UserModel.RequiredAction.UPDATE_PROFILE); } return validate(realm, user); } }
user.setFirstName(userRep.getFirstName()); user.setLastName(userRep.getLastName()); user.setFederationLink(userRep.getFederationLink()); if (userRep.isTotp() != null) user.setOtpEnabled(userRep.isTotp()); if (userRep.getAttributes() != null) {