Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
feature: process nested tag claims
Allow IDPs to provide session tags via the nested format.
This is for #4
As a bonus it also has feature: implement the Deny effect for policies
Which allowed to create a test case that simulates a scenario where this could be of value.
At this time there are not yet trust policies but since OIDC providers are configured the trust is configured towards OIDC providers. You just cannot distinguish trust on a per role level. For that trust policies are needed which is significantly more work and that could be another future improvement (which will be needed once an sts action like assumeRole gets implemented)