Enable editing of custom claims for keycloak provider#16444
Enable editing of custom claims for keycloak provider#16444rak-phillip merged 1 commit intorancher:masterfrom
Conversation
6db6882 to
84f1d38
Compare
aalves08
left a comment
There was a problem hiding this comment.
Overall, the functionality and interaction with backend seems to work just fine. Data is being persisted on the backend and if we clear the checkbox on the UI, data is cleared on the backend as expected.
3 comments:
- should we surface the claims info on the non-edit screen?
- should we validate the email field (we probably have it somewhere in our code...)?
- if we "add custom claims" (check the checkbox) are any of the fields required? right now the form reacts as none being required
Signed-off-by: Phillip Rak <rak.phillip@gmail.com>
84f1d38 to
8581806
Compare
I don't think we should change this. The scope of the change is to surface existing behavior for keycloak.
If the ask is to treat this field as an email address, no. The custom claim would be something like
I don't believe so. Custom claims are for manually mapping when a provider doesn't use standard claims in a token. There's no guarantee that we will need to map all three currently represented. |
Summary
This enables the editing of custom claims for keycloak provider.
Fixes #16241
Occurred changes and/or fixed issues
Technical notes summary
rancher/rancher#53465 contains fixes for custom userName claims in keycloak. This change requires that custom claims be enabled for keycloak as well as generic oidc.
Areas or cases that should be tested
Keycloak OIDC should render and save custom claims
Areas which could experience regressions
This change should be additive to the keycloak provider config form.
Screenshot/Video
Checklist
Admin,Standard UserandUser Base