User story #24182
closed
Add a role mapping and filtering for OIDC provided roles
Added by François ARMAND 10 months ago.
Updated 6 months ago.
Description
We would like to be able to restriect the list of role an IdP can address, and allow a mapping between the names used by the IdP and Rudder internal names.
The config and could look like:
rudder.auth.oauth2.provider.okta.roles.mapping.enforced=true
rudder.auth.oauth2.provider.okta.roles.mapping.entitlements.rudder_admin=administrator
rudder.auth.oauth2.provider.okta.roles.mapping.entitlements.rudder_readonly=readonly
(if enforced is true, we only are allowed to use the roles from entitlements, else entitlements are additionnal aliases)
Files
- Status changed from New to In progress
- Assignee set to François ARMAND
- Status changed from In progress to Pending technical review
- Assignee changed from François ARMAND to Clark ANDRIANASOLO
- Pull Request set to https://github.com/Normation/rudder-plugins/pull/651
- Related to Architecture #24183: Add an Alias type of Role to track role mapping and IdP logout added
- Status changed from Pending technical review to Pending release
- Target version changed from 1020 to 7.3.12-backport-24146
- Related to Bug #24325: Fix initialization of spring beans in auth-backends added
- Related to Bug #24384: Documentation for OIDC properties is not up to date added
- Target version changed from 7.3.12-backport-24146 to 7.3
- Fix check changed from To do to Checked
- Status changed from Pending release to Released
Also available in: Atom
PDF