Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

GUACAMOLE-1844 : OIDC JWT claims as user token #943

Merged
merged 1 commit into from
Mar 5, 2024

Conversation

mildis
Copy link
Contributor

@mildis mildis commented Jan 15, 2024

GUACAMOLE-1844 : OIDC JWT claims as user token

This patch allows IDP to send JWT claims that can be mapped to user tokens, prefixed with OIDC_. Same case transormation apply than LDAP_ and CAS_.

Define openid-attributes-claim-type with a comma-separated list of claims that should be mapped.

Multivalued JWT claims are not unrolled.

Copy link
Contributor

@necouchman necouchman left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@mildis This looks fine overall - I just have a couple of style requests.

@necouchman
Copy link
Contributor

@mildis - You seem to have added a commit to this that probably shouldn't be there: 4e24993 (Merge branch apache:master into oidc_custom_tokens).

GUACAMOLE-1844 : OIDC JWT claims as user token

This patch allows IDP to send JWT claims that can be mapped to user tokens, prefixed with OIDC_.
Same case transormation apply than LDAP_ and CAS_.

Define openid-attributes-claim-type with a comma-separated list of claims that should be mapped.

Multivalued JWT claims are not unrolled.
@mildis
Copy link
Contributor Author

mildis commented Feb 13, 2024

Yeah sorry, bad handling of a rebase…
Corrected

@necouchman necouchman merged commit c257a57 into apache:main Mar 5, 2024
1 check passed
@mildis mildis deleted the oidc_custom_tokens branch March 5, 2024 13:11
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants