-
Notifications
You must be signed in to change notification settings - Fork 47
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
New configuration to obtain the User/Group Information from the additional Access Token and Userinfo #7023
Comments
Hi @felix-liang - will OpenLiberty/open-liberty#25460 be included in 23.0.0.12 or a later release? |
Yes, It will be included in 23.0.0.12. |
Hi @felix-liang - I have a few questions to clarify
Or are the only choices the default or
Thanks! |
Hi @dmuelle, below is my comments
Hope that helps a bit. |
Thanks Felix, a draft of the update is now available for review: When you have chance, let me know if any further edits are needed. If not, you can add the |
Just one thing I'd like to point out is that the |
Hi Felix, here's the updated draft to clarify that the rule looks for both let me know if any further edits are needed. Thanks! |
Thanks David! It looks good to me. |
No worries- I'll add it. Thanks Felix! |
@ramkumar-k-9286 this update is ready for peer review when you have a chance |
Feature: OpenLiberty/open-liberty#25460
Relevant docs page: https://openliberty.io/docs/latest/reference/feature/openidConnectClient-1.0.html
New configuration: tokensOrderToFetchCallerClaims
With the current logic, the User or Group information can only be obtained from ID Token. However, in some clients' environment, they can not have group information as part of the ID Token, instead Access Token. In order to align with Jarkata EE Security implementation, the new feature will also look up the Userinfo as well.
The following are the configuration options,
This is the default value. If the configuration is not specified, the "IDToken" will be used.
With this option, if a claim is not found from Access Token, it will keep searching in IDToken and finally Userinfo.
Below is one example of configuring the parameter.
In the above example, when looking up a user's group, if claim "roleid" doesn't exist in AccessToken, it will continue searching in IDToken, if still not found, then it will check Userinfo, in the end if it still can not find it, then the user won't have any group information it belongs to.
However, when checking the user identifier claim, if it doesn't find it from all the configured tokens, it will respond unauthorized response code.
The text was updated successfully, but these errors were encountered: