Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Add ability to set user roles from OIDC claims #762

Draft
wants to merge 4 commits into
base: qa/0.x
Choose a base branch
from

Conversation

sbreker
Copy link
Member

@sbreker sbreker commented Mar 4, 2025

Added new OIDC setting that will allow admins to configure whether user
roles will be set from the OIDC claims, or assigned the system default
role. The setting name is 'OIDC_OP_SET_ROLES_FROM_CLAIMS' and defaults
to True.

Added new OIDC setting that will configure the token path for retrieving
the role info. The setting name is 'OIDC_OP_ROLE_CLAIM_PATH' and
defaults to "realm_access.roles" which is the standard Keycloak location
for user role info.

These settings should be configured individually for each provider
appending the provider name for secondary providers as necessary.

sbreker added 4 commits March 3, 2025 16:07
Added new OIDC setting that will allow admins to configure whether user
roles will be set from the OIDC claims, or assigned the system default
role. The setting name is 'OIDC_OP_SET_ROLES_FROM_CLAIMS' and defaults
to True.

Added new OIDC setting that will configure the token path for retrieving
the role info. The setting name is 'OIDC_OP_ROLE_CLAIM_PATH' and
defaults to "realm_access.roles" which is the standard Keycloak location
for user role info.

These settings should be configured individually for each provider
appending the provider name for secondary providers as necessary.
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

1 participant