mirror of
https://github.com/librenms/librenms.git
synced 2024-10-07 16:52:45 +00:00
clarify okta claim configuration requirement (#16142)
This commit is contained in:
@@ -298,6 +298,11 @@ Socialite can specifiy scopes that should be included with in the authentication
|
|||||||
For example, if Okta is configured to expose group information it is possible to use these group
|
For example, if Okta is configured to expose group information it is possible to use these group
|
||||||
names to configure User Roles.
|
names to configure User Roles.
|
||||||
|
|
||||||
|
This requires configuration in Okta. You can set the 'Groups claim type' to 'Filter' and supply
|
||||||
|
a regex of which groups should be returned which can be mapped below.
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
First enable sending the 'groups' claim (along with the normal openid, profile, and email claims).
|
First enable sending the 'groups' claim (along with the normal openid, profile, and email claims).
|
||||||
Be aware that the scope name must match the claim name. For identity providers where the scope does
|
Be aware that the scope name must match the claim name. For identity providers where the scope does
|
||||||
not match (e.g. Keycloak: roles -> groups) you need to configure a custom scope.
|
not match (e.g. Keycloak: roles -> groups) you need to configure a custom scope.
|
||||||
|
BIN
doc/img/socialite-okta-4.png
Normal file
BIN
doc/img/socialite-okta-4.png
Normal file
Binary file not shown.
After Width: | Height: | Size: 40 KiB |
Reference in New Issue
Block a user