Actions
User story #24182
openAdd a role mapping and filtering for OIDC provided roles
Effort required:
Name check:
To do
Fix check:
Checked
Regression:
No
Description
We would like to be able to restriect the list of role an IdP can address, and allow a mapping between the names used by the IdP and Rudder internal names.
The config and could look like:
rudder.auth.oauth2.provider.okta.roles.mapping.enforced=true rudder.auth.oauth2.provider.okta.roles.mapping.entitlements.rudder_admin=administrator rudder.auth.oauth2.provider.okta.roles.mapping.entitlements.rudder_readonly=readonly
(if enforced is true, we only are allowed to use the roles from entitlements, else entitlements are additionnal aliases)
Files
Actions