-
Notifications
You must be signed in to change notification settings - Fork 58
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add a batch job (or a pre-packaged external utility) to clean up unused auto-enrolled user entries #663
Comments
@yurem Shall I write a script for this? |
Yes, I think external script will be good for this. Moreover we can allow admin to run it with additional (non default settings) to do clean up. For me clean u should do user removal in 2 steps:
oxLastLogonTime usage can be turn off in oxAuth config to get maximum performance. |
Sounds good. Let me try to formalize it a bit for @mbaser : Description: Notes:
Params:
Impl. details:
|
I made a mistake wrt this:
The following lists some examples of
Also account that That means we have to check the value starts with |
Currently we don't seem to have a straightforward way to manage users auto-enrolled by custom scripts. In big deployments it may become a significant problem. If an authentication method relying on external source of identity is removed from configuration, users that have been enrolled by it so far must be removed trough some other means, like using direct writes to persistence layer, or via SCIM. User entries that are no longer used will accumulate in database and will require each organization to write a custom code, a scheduled job that will purge stale entries.
On the other hand, as this kind of user entries can be re-enrolled as needed - i.e. if an user will decide to log in after a long period of inactivity - it may not be a big problem if their Gluu user entry is no more - as it can enrol them again. Some attributes on the new entry won't be the same (like, "inum"), but main set of attributes released to SPs and RPs will be (and should be enough) - as it's passed from external IDP each time.
Suggestion:
As user entries may have
oxLastLogonTime
attribute attached, a new feature could be added that, if enabled, could on regular basis purge external user entries that haven't been used for specified amount of time (similar to how tokens are already purged now).It must do exception for users added to "Managers" group, though, as membership is defined by DN which contain "inum" of the current user entry of an admin user.
The text was updated successfully, but these errors were encountered: