7b41c8e987
fix: role extraction from access token in keycloak oidc ( #1916 )
...
* Fix wrong token used in Keycloak OIDC provider
* Update CHANGELOG for PR #1916
* Update tests
* fix: keycloak oidc role extraction
---------
Co-authored-by: Jan Larwig <jan@larwig.com >
2025-04-28 10:23:19 +01:00
fc6e7fdbd1
bugfix: OIDCConfig based providers are not respecting flags and configs ( #2299 )
...
* add full support for all oidc config based providers to use and respect all configs set via OIDCConfig
* add changelog entry
---------
Co-authored-by: Joel Speed <Joel.speed@hotmail.co.uk >
2023-11-25 11:32:31 +00:00
7683902a42
bugfix: default scopes for OIDCProvider based providers
2023-09-10 20:10:14 +00:00
fd2807c091
Fix uninitialized user claim ( #1873 )
...
* Fix uninitialized user claim
Some providers doesn't initialize data with setProviderDefaults function
(keycloak-oidc for example), therefore UserClaim is never initialized
with the default value and stay as an empty string.
This result in an empty user.
* Add CHANGELOG.md entry for #1873
* Call setProviderDefaults where missing
Co-authored-by: Joel Speed <Joel.speed@hotmail.co.uk >
2022-11-07 08:42:33 +00:00
7fe6384f38
Fix Linting Errors ( #1835 )
...
* initial commit: add groups to azure
Signed-off-by: andrewphamade@gmail.com <andrewphamade@gmail.com >
* fix deprecations and linting errors
Signed-off-by: Andrew Hamade <andrewphamade@gmail.com >
* remove groups testing from azure provider
Signed-off-by: Andrew Hamade <andrewphamade@gmail.com >
* fix test error
Signed-off-by: Andrew Hamade <andrewphamade@gmail.com >
* verify-generate
Signed-off-by: Andrew Hamade <andrewphamade@gmail.com >
Signed-off-by: andrewphamade@gmail.com <andrewphamade@gmail.com >
Signed-off-by: Andrew Hamade <andrewphamade@gmail.com >
2022-10-21 11:57:51 +01:00
6e02bb496b
Extract Keycloak roles while creating a session from token ( #1720 )
...
* extract roles while creating session
* add test
* adjust changelog
* remove unused func
* shorten implementation
Co-authored-by: Christian Hirsch <christian.hirsch@nitrado.net >
Co-authored-by: Joel Speed <Joel.speed@hotmail.co.uk >
2022-08-08 23:28:46 +01:00
d162b018a8
Move provider initialisation into providers package
2022-02-16 10:38:05 +00:00
e6223383e5
update keycloak oidc provider and add unit tests
2021-08-02 11:39:50 +02:00
ab54de38cc
Extract roles from Keycloak Access Tokens
2021-07-30 09:46:13 +02:00
4c0beb373f
Add keycloak-oidc provider based on OIDCProvider
2021-07-30 09:46:13 +02:00