OIDC claim-to-group/role mapping #81
Reference in New Issue
Block a user
Delete Branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Context
OIDC users are auto-registered with
provider = "oidc:<issuer>"and assigned the VIEWER role by default (OidcAuthController). There is no automatic mapping from OIDC claims (e.g.,groups,roles,realm_access) to Cameleer groups or roles.Admins must manually assign groups/roles to each OIDC user after their first login.
Requirements
Claim mapping configuration
oidc_configtable (or newoidc_claim_mappingstable) to store mapping rulesPOST /api/v1/admin/oidc/mappings— create a mapping ruleGET /api/v1/admin/oidc/mappings— list mapping rulesDELETE /api/v1/admin/oidc/mappings/{id}— delete a mapping ruleMapping rule structure
Behavior
UI
Notes
groups(Azure AD/Entra),realm_access.roles(Keycloak),cognito:groups(AWS)