-
Notifications
You must be signed in to change notification settings - Fork 2.5k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
feat: As a user, I want to set a validation on custom claims in oidc auth, so that I can restrict access to backend based on that rule #8772
Comments
LGTM |
Hello @spacewander @goblain if this issue is still open, please assign it to me, possible solution: To implement this feature, we can introduce a new configuration parameter in the OIDC auth plugin named Each map will contain two keys: During the authentication process, the plugin will validate the custom claim against the allowed values specified in the
With this implementation, the user can specify a list of custom claim validators in the
This will ensure that the |
You could submit a PR with test added to it. |
@spacewander please checkout #9068 |
I'l like this issue to be assigned to me if possible, thanks. |
What is the status on this issue? |
would you like to work on it @Visserr2 ? |
What is the status of this issue?@shreemaan-abhishek |
Description
ability to configure openid-connect with something like
that would return 401 if failed to evaluate successfully
The text was updated successfully, but these errors were encountered: