-
Notifications
You must be signed in to change notification settings - Fork 1.7k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Possibility to select connector in client request #1084
Comments
Thanks for opening this! Copying my response from #1026 (comment)
The change being simple is something we consider but isn't an argument for why the feature is useful or what it needs to do. I'm trying to get a sense of why this feature would be used. What's your exact use case here? We've heard crazy things like clients needing to only be able to see certain connectors. But this doesn't sound like that. |
My use case: Other reasons:
|
My use case is for 2 different LDAP connectors where handful of users only exist in one LDAP and rest in another LDAP. If I can have a way to specify which (LDAP) connector to use in the client request, or a way to programatically choose which from the screen with selection, that would be handy for me. |
+1 for this. |
I did PR some time ago: This functional added with param &connector to auth requests. |
Our team has a similar requirement to @kiich 's. @sdrozdkov Could you make a pull request? |
Any updates on this issue? We would like to use this feature as well, our use case is similar to @pbochynski's. We have multiple customers, who may or may not have an internal IDP. If they have one then we would like to configure a dex connector so they can use their existing IDP to sign in to our application. If they don't then we would allow them to use our IDP. Our only requirement is that the user should not have to choose the desired connector, we should have the ability to choose it programmatically from our application. A nice-to-have would be if each client had a default connector configuration so that the client_id could determine which connector was used |
Interested in this scenario as well, @dbkegley @sdrozdkov. Hope #1138 or similar solution can be landed sometime soon. |
+1 for this. Hope #1138 or similar solution can be landed sometime soon. |
+1 Regarding your questions, here's my take:
Thanks for your consideration! |
@ericchiang Hey, this one looks like a feature that many people from different projects look at. Any thoughts? |
@ericchiang, we interested in this feature too. Has several ldap connectors to the same server to provide different group search based on client_id. |
hi, my usecase is the following: bind different ldap groups to different services in order to allow some user to login in certain service and others users in other service. I guess that this can be achieved defining multiple connectors in dex, but then how to refer to them in the ingress ? |
+1 |
4 similar comments
+1 |
+1 |
+1 |
+1 |
+1 bump, this feature would be real useful to me right now, I want to have different GitHub connectors with team assertions and then specific apps use team specific connectors. |
It won't happen. Let's admit it and close the issue. |
@pbochynski Hello. I think we already have what you want in dex. |
@nabokihms HI, I'm trying to implement a solution that redirects clients to |
You are right! Sorry for misleading 😅 The right way to select a specific connector is to pass its id as a query parameter. |
@nabokihms Hi, can you please point me to the docs link for this? I want to implement this but cant find any related material. |
For some clients it its not possible to implement it since their backend checks for path |
Agree with @AstritCepele above, this is not a good solution when utilizing open source clients that check for
|
+1 for this feature :D |
Right now if there is more than one connector configured user has to select one before he is redirected to the authentication page. It should be possible to skip that step if a client has preferred connector, e.g. google.
The change is rather simple: #1083
The text was updated successfully, but these errors were encountered: