Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Add ability to set admin from OIDC claims #2027

Draft
wants to merge 1 commit into
base: qa/1.x
Choose a base branch
from

Conversation

sbreker
Copy link
Member

@sbreker sbreker commented Mar 8, 2025

Adds new OIDC setting that will allow admins to configure whether user
roles will be set from the OIDC claims, or assigned the system default
role. The setting name is 'OIDC_OP_SET_ROLES_FROM_CLAIMS' and default
is False.

Adds new OIDC setting that will configure the token path for retrieving
the role info. The setting name is 'OIDC_OP_ROLE_CLAIM_PATH' and
defaults to "realm_access.roles" which is the standard Keycloak location
for user role info.

These settings should be configured individually for each provider by
appending the provider name for secondary providers as necessary.

@sbreker sbreker force-pushed the dev/set-role-from-oidc-token branch from 3630a23 to 0a604fc Compare March 8, 2025 08:10
Adds new OIDC setting that will allow admins to configure whether user
roles will be set from the OIDC claims, or assigned the system default
role. The setting name is 'OIDC_OP_SET_ROLES_FROM_CLAIMS' and default
is False.

Adds new OIDC setting that will configure the token path for retrieving
the role info. The setting name is 'OIDC_OP_ROLE_CLAIM_PATH' and
defaults to "realm_access.roles" which is the standard Keycloak location
for user role info.

These settings should be configured individually for each provider by
appending the provider name for secondary providers as necessary.
@sbreker sbreker force-pushed the dev/set-role-from-oidc-token branch from 5e6a24c to 6c47e52 Compare March 8, 2025 09:00
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

1 participant