@Override public void addRequiredAction(String action) { delegate.addRequiredAction(action); }
@Override public void addRequiredAction(RequiredAction action) { delegate.addRequiredAction(action); }
@Override public void addRequiredAction(RequiredAction action) { delegate.addRequiredAction(action); }
@Override public void addRequiredAction(String action) { delegate.addRequiredAction(action); }
@Override public void addRequiredAction(RequiredAction action) { getDelegateForUpdate(); updated.addRequiredAction(action); }
@Override public void addRequiredAction(RequiredAction action) { getDelegateForUpdate(); updated.addRequiredAction(action); }
@Override public void addRequiredAction(String action) { getDelegateForUpdate(); updated.addRequiredAction(action); }
@Override public void addRequiredAction(String action) { getDelegateForUpdate(); updated.addRequiredAction(action); }
protected UserModel importUserToKeycloak(RealmModel realm, String username) { // Just guessing email from kerberos realm String email = username + "@" + kerberosConfig.getKerberosRealm().toLowerCase(); logger.debugf("Creating kerberos user: %s, email: %s to local Keycloak storage", username, email); UserModel user = session.userLocalStorage().addUser(realm, username); user.setEnabled(true); user.setEmail(email); user.setFederationLink(model.getId()); user.setSingleAttribute(KERBEROS_PRINCIPAL, username + "@" + kerberosConfig.getKerberosRealm()); if (kerberosConfig.isUpdateProfileFirstLogin()) { user.addRequiredAction(UserModel.RequiredAction.UPDATE_PROFILE); } return validate(realm, user); } }
if (requiredActions != null && !requiredActions.isEmpty()) { for (UserModel.RequiredAction reqAction : requiredActions) { user.addRequiredAction(reqAction);
user.addRequiredAction(UserModel.RequiredAction.valueOf(requiredAction));