-
Notifications
You must be signed in to change notification settings - Fork 409
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
OpenID generic provider support #10151
Closed
4 tasks done
Tracked by
#10056
offtherailz opened this issue
Apr 3, 2024
· 3 comments
· Fixed by #10152, geosolutions-it/geostore#330, geosolutions-it/geostore#354 or geosolutions-it/geostore#357
Closed
4 tasks done
Tracked by
#10056
OpenID generic provider support #10151
offtherailz opened this issue
Apr 3, 2024
· 3 comments
· Fixed by #10152, geosolutions-it/geostore#330, geosolutions-it/geostore#354 or geosolutions-it/geostore#357
Comments
This was referenced Apr 3, 2024
17 tasks
tdipisa
added
BackportNeeded
Commits provided for an issue need to be backported to the milestone's stable branch
enhancement
and removed
New Feature
used for new functionalities
labels
Apr 24, 2024
tdipisa
added
C206-DEUTSCHE_BAHN-2024-SUPPORT
and removed
C206-DEUTSCHE_BAHN-2023-SUPPORT
labels
May 16, 2024
2 tasks
@ElenaGallo I'll test this and let you know |
According with this We don't have the scopes "groups". For this reason @afabiani will provide an additional fix to support the request of the groups scope. |
@offtherailz patch provided here |
tdipisa
removed
the
BackportNeeded
Commits provided for an issue need to be backported to the milestone's stable branch
label
Jul 2, 2024
Closed
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Description
Provide a generic support for an openID Connect provider.
Acceptance criteria
mapstore-ovr.properies
to be connected to a generic openid providerdiscoveryUrl
: to properlyclientId
clientSecret
principalKey
: to identify the claim to use for the username.The purpose is to provide the support to allow login via oidc + LDAP, for services like Azure.
Other useful information
The text was updated successfully, but these errors were encountered: