-
Notifications
You must be signed in to change notification settings - Fork 113
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
ldap user manager does not fill id, opaque_id and idp #326
Comments
@madsi1m will provide a configuration option for the LDAP plugin to setup the Idp |
We are dancing around the problem that we need a way to persist a user id but the different systems may know the user under different ids:
The perfect userid for reva is unique, persistent and non-reassignable. Why?
Best we can do is keep track of the history uf userids and provide a migration script. First step to make this technically possible: cs3org/cs3apis#46 |
Ultimately, we will always need to be able to update the owner and sharing permissions in an easy way. The idea is to have a cli tool that can replace a user or group id and transfer the ownership and share grantees. Tracked in owncloud/ocis#58 Keeping a history of previous ids can be added later, as it only allows deferring the ownership change. |
it does now |
outdated |
currently lookup of opaque_id and idp in ldap is not possible because it the ldap user provider does not fill them with anything. we at least need to be able to configure the idp. the opaque_id should be configurable by specifying which attrubute from ldap to use. we could split the userPrincipalName or configure two attributes for opaqe_id and idp (which map to sub and iss in openid world).
We should implement an id-strategy so that we can implement different solutions how to look up the id.
warning ... this is only a workaround: there might not be a way to retrieve the oidc
sub
from ldap.The correct solution is to implement a new SCIM user manager, because there are idps that support listing users using the SCIM api and there is already a draft OpenID Connect Profile for SCIM Services. Tracked in #327
The text was updated successfully, but these errors were encountered: