-
Notifications
You must be signed in to change notification settings - Fork 272
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[FEATURE] Support custom SAML headers for expiry time #4046
Labels
enhancement
New feature or request
Comments
derek-ho
added
enhancement
New feature or request
untriaged
Require the attention of the repository maintainers and may need to be prioritized
labels
Feb 13, 2024
[Triage] @derek-ho thanks for filing this issue. Would you please add exit criteria that can be actioned upon to mark this as triaged? |
DarshitChanpura
removed
the
untriaged
Require the attention of the repository maintainers and may need to be prioritized
label
Feb 19, 2024
Closing this as nobody as commented otherwise. |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Is your feature request related to a problem?
Coming from this comment: opensearch-project/security-dashboards-plugin#159 (comment), it seems like a deficiency with the security project that we are hard forcing timeout based on one field, when there are popular SAML IDP's (i.e. auth0) which do not follow this format. We should evaluate whether we can support this from the security backend side, or if we can suggest users to somehow map it on their side. I found this: https://auth0.com/docs/authenticate/protocols/saml/saml-configuration/customize-saml-assertions, but not sure if it actually solves their use case.
The text was updated successfully, but these errors were encountered: