Skip to content

Conversation

@pedroigor
Copy link
Contributor

@pedroigor pedroigor commented Aug 22, 2025

Closes #41418

  • Currently, the Organization API relies on the manage-realm role to enforce admin access.
  • The useIsFeatureEnabled hook is updated to also check permissions when checking if a feature is enabled. That should make the UI also a bit better because the Organizations settings in the Realm Settings tab is not even shown if the admin user does not have the required role.

…is enabled or not

Do not query organizations if manage-realm is not granted

Closes keycloak#41418

Signed-off-by: Pedro Igor <[email protected]>
Copy link
Contributor

@martin-kanis martin-kanis left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Thanks @pedroigor. I tested the PR in the admin console and it fixes the problem described in the issue.
I let you decide whether you want another review from someone with deeper UI knowledge.

@ahus1 ahus1 enabled auto-merge (squash) August 26, 2025 19:30
@ahus1 ahus1 merged commit 600f03d into keycloak:main Aug 26, 2025
55 checks passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

Projects

None yet

Development

Successfully merging this pull request may close these issues.

Access to user details for restricted admin fails after enabling organizationin realm

3 participants