-
Notifications
You must be signed in to change notification settings - Fork 330
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
OpenId and SAML Client's attributes #389
Conversation
…level roles association
[skip ci]
…ric-client-role-mapper-extension Extension of keycloak_generic_client_role_mapper resource to support realm-level roles association
…reference Features/management permission reference
Features/identity-provider-mapper-extra-config
…support realm-level roles association"
…loak-generic-client-role-mapper-extension Revert "Extension of keycloak_generic_client_role_mapper resource to support realm-level roles association"
…urce to support realm-level roles association"" This reverts commit bae0f66.
…ric-client-role-mapper-extension keycloak_generic_client_role_mapper realm-level roles association support
…reserved-keys Features/using reflection for reserved keys
I guess I'm not completely understanding the problem we're trying to solve here. I understand that your goal is to add user-defined attributes to API calls for resources such as openid and saml clients, but is there any reason that we need to use reflection or define reserved keys? My thinking is that we could just allow users to use this This appears to be what we're doing with the |
Hey @mrparkers , you're totally right. I wasn't aware of that implementation in IdentityProviderMapperConfig. I'll use the same approach for OpenId/SAML client. |
…hout-restrictions Features/client attributes without restrictions
…hout-restrictions Fix use of ValueOf for nil value
Hi @mrparkers, client (OpenId and SAML) attributes are implemented as extra_config. |
Hi all, are there any updates on this PR? Setting custom attributes on clients would be very useful for me. Please let me know, if there is something I can do to help progressing this PR. |
BUMP @slavko-vega and @mrparkers |
Hi everyone, I think the functionality that's been introduced within this PR has already been implemented via several other PRs:
Let me know if you think that anything else is missing, but I think for now we can close this PR. |
Supported are attributes for OpenId and SAML clients