-
Notifications
You must be signed in to change notification settings - Fork 50
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
SAML fixes #654
SAML fixes #654
Conversation
433e8b7
to
86c1012
Compare
d7bcbaa
to
a421ac3
Compare
Signed-off-by: Rick Elrod <rick@elrod.me>
f2b4e61
to
c1d35eb
Compare
Signed-off-by: Rick Elrod <rick@elrod.me>
Signed-off-by: Rick Elrod <rick@elrod.me>
c1d35eb
to
cf25706
Compare
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Doing some testing of the PR now, if I com back with nothing, I'll approve this.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Can confirm that SAML auth no longer breaks via keycloak, and unit tests pass for me locally, LGTM.
Co-authored-by: Brennan Paciorek <50780403+BrennanPaciorek@users.noreply.github.com>
Quality Gate passedIssues Measures |
This ensures that the firstname/lastname/email/etc attributes that are entered into the IdP fields are returned out of the assertion. If additional information is needed admins will have to either set
GET_ALL_EXTRA_DATA
to get it all or they can setEXTRA_DATA
to get specific fields.