-
Hi, We're using F5 APM as OIDC provider, I have followed steps mentioned here and I can login but don't see user information. Also it appears that scopes data is not being used by Argo since it's allowing users to login but doesn't allow to create any Applications thought user is in osadmin group . I am certain that I am missing something here since groups is not returned in the scopes or claims data. Error when trying to create an Application after logging in with user part of the osadmin group: Please see below configuration and let me know what needs to be changed here in order for Argo to use returned scopes/claims, display user name or email or uid for a successful login as well. Also noticed that Argo logout is not always going to back to Argo login page, instead some times it goes to the OIDC provider login page.
Sample OIDC token decoded data from jwt.io:
Thanks |
Beta Was this translation helpful? Give feedback.
Replies: 1 comment
-
As I stated in the question, APM is not returning groups scope, so worked with the team to return the data with a different scope name(entitlements)and used that in
|
Beta Was this translation helpful? Give feedback.
As I stated in the question, APM is not returning groups scope, so worked with the team to return the data with a different scope name(entitlements)and used that in
requestedScopes
. I now see that user withosadmin
OIDC group is able to create Applications, Projects, and other Argo resources.requestedScopes: ["openid", "profile", "email", "entitlements"]