Update keycloak_realm, add organizations_enabled (#8927)
* Update keycloak_realm.py, add organizations_enabled * Update plugins/modules/keycloak_realm.py Co-authored-by: Felix Fontein <felix@fontein.de> * Create 9027-support-organizations-in-keycloak-realm.yml Add changelog file * Bump version_added * Update version_added * Update changelogs/fragments/9027-support-organizations-in-keycloak-realm.yml Co-authored-by: Felix Fontein <felix@fontein.de> --------- Co-authored-by: Felix Fontein <felix@fontein.de>pull/9060/head
parent
5b3b7a1fb1
commit
a8c41ac4c1
|
@ -0,0 +1,2 @@
|
|||
minor_changes:
|
||||
- keycloak_realm - add boolean toggle to configure organization support for a given keycloak realm (https://github.com/ansible-collections/community.general/issues/9027, https://github.com/ansible-collections/community.general/pull/8927/).
|
|
@ -384,6 +384,13 @@ options:
|
|||
aliases:
|
||||
- passwordPolicy
|
||||
type: str
|
||||
organizations_enabled:
|
||||
description:
|
||||
- Enables support for experimental organization feature.
|
||||
aliases:
|
||||
- organizationsEnabled
|
||||
type: bool
|
||||
version_added: 10.0.0
|
||||
permanent_lockout:
|
||||
description:
|
||||
- The realm permanent lockout.
|
||||
|
@ -686,6 +693,7 @@ def main():
|
|||
otp_policy_type=dict(type='str', aliases=['otpPolicyType']),
|
||||
otp_supported_applications=dict(type='list', elements='str', aliases=['otpSupportedApplications']),
|
||||
password_policy=dict(type='str', aliases=['passwordPolicy'], no_log=False),
|
||||
organizations_enabled=dict(type='bool', aliases=['organizationsEnabled']),
|
||||
permanent_lockout=dict(type='bool', aliases=['permanentLockout']),
|
||||
quick_login_check_milli_seconds=dict(type='int', aliases=['quickLoginCheckMilliSeconds']),
|
||||
refresh_token_max_reuse=dict(type='int', aliases=['refreshTokenMaxReuse'], no_log=False),
|
||||
|
|
Loading…
Reference in New Issue