Skip to content

Conversation

anderska
Copy link

@anderska anderska commented Sep 11, 2025

Fix so the scopes for oauth2 can be configured, in our case we are rejecting logins if the user doesnt have all the requested roles.

@anderska anderska requested a review from a team as a code owner September 11, 2025 10:24
@github-project-automation github-project-automation bot moved this to 📘 Todo in phoenix Sep 11, 2025
@dosubot dosubot bot added the size:XS This PR changes 0-9 lines, ignoring generated files. label Sep 11, 2025
Copy link
Contributor

github-actions bot commented Sep 11, 2025

CLA Assistant Lite bot All contributors have signed the CLA ✍️ ✅

cursor[bot]

This comment was marked as outdated.

@anderska
Copy link
Author

I have read the CLA Document and I hereby sign the CLA

@anderska
Copy link
Author

recheck

1 similar comment
@anderska
Copy link
Author

recheck

github-actions bot added a commit that referenced this pull request Sep 11, 2025
@dosubot dosubot bot added size:S This PR changes 10-29 lines, ignoring generated files. and removed size:XS This PR changes 0-9 lines, ignoring generated files. labels Sep 11, 2025
@axiomofjoy
Copy link
Contributor

Hey @anderska, thanks for your contribution. I believe that Phoenix currently requires each of those scopes to actually fill in the tuple in the users table, and it would require a significant refactor to change that. We don't have current plans to support non-OIDC-compliant OAuth2 IDPs, and in my understanding, the requested scopes are standard among OIDC providers. Can you help me understand concretely what IDP you have experienced issues with and we'll see if it's something we can support?

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
size:S This PR changes 10-29 lines, ignoring generated files.
Projects
Status: 📘 Todo
Development

Successfully merging this pull request may close these issues.

2 participants