-
Notifications
You must be signed in to change notification settings - Fork 24.9k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
OpenId realm supports the authorization_realms setting #64583
Comments
Pinging @elastic/es-docs (>docs) |
Pinging @elastic/es-security (:Security/Authorization) |
I'm a little perplexed on this one. @merlixelastic is correct that we indicate support in the Configuring role mappings page for OIDC:
However, in Mapping users and groups to roles, there's a note indicating that:
We explicitly don't mention OpenID Connect. The commit that added this note includes "authorization_realm support in the pki, ldap, saml & kerberos realms". Again, I don't see any mention of OpenID Connect, which appears to be deliberate. I'm wondering if the page for Configuring role mappings is incorrect, and we should revise or remove this information around configuring
|
This is because we didnt have an openid connect realm back then ( it was introduced in 7.2 ) Openid connect supports authorization realms and we should add the missing setting in the reference page. I just missed to add it when adding the oidc docs the first time around, this was not done on purpose. |
Ah, thanks for the context @jkakavas! I'll get that setting added 👍 |
Description of the problem including expected versus actual behavior:
This is a documentation issue about OpenID realm not showing
authorization_realms
setting support.Steps to reproduce:
In the security settings, the
authorization_realms
setting is missing from the Open ID connect realm.I do see the setting 4 times for the following realms: SAML, LDAP, PKI and Kerberos.
This implies this
authorization_realms
setting is not valid for OpenID realm hence authorization delegation is not supported.However the role mapping page shows this setting is in fact supported.
authorization_realms
setting for OpenID?Provide logs (if relevant):
The text was updated successfully, but these errors were encountered: