-
-
Notifications
You must be signed in to change notification settings - Fork 100
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
HOWTO set up is_staff and is_superuser from Azure to App #219
Comments
Hi! I'm out skiing so I'll give you a little tip, and we can troubleshoot more another day. If you want to make a user super user based on a group, you can use this setting: 'GROUP_TO_FLAG_MAPPING': {
'is_staff': 'MyAdminGroup'
}, |
Thanks for the quick answer, on the skiing slopes ⛷️ I have setup Groups in Azure and the settings accordingly, but I still have something astray with the token
I will try again to look at the user flow configuration in the meantime :) Cheers |
😊 In Azure you have application roles and group claims. I recommend using application roles 😊 https://docs.microsoft.com/en-us/azure/active-directory/develop/howto-add-app-roles-in-azure-ad-apps If you have groups, you need to configure them to be in the token I believe. Should be under app registration -> token configuration. They will not be under the |
Hi @JonasKs , TLDR; That would probably a nice addition to the doc, I can make a PR if you want. My more detailed findings:
The blocking issue I face is that you simply do not have the features available. Here is a screenshot of an app, from the Compared to what is in the Azure AD : No 🆘 I put it aside for now, but if you have any experience with it, that will be very welcomed !
I face another issue with the 🔬 What about supporting a list of I am happy to make a PR if that makes sense for you
I am still lost on how you can define properties in Azure AD, and pass them to the app through claims. Any insight is welcomed again. I guess that remains the main topic of the discussion :) Cheers, |
Hi, first of, Thank you for the detailed explanations. It is so much easier to help people who put an effort into explaining. 😊 I'm not on a PC this weekend, but I think #166 already solves your use case for usernames? Could you check that out? As for the rest, I'll read through again tomorrow and see if I have any input n |
My pleasure :) I have tried the I am not sure how it comes since I am using a professionnal AD with my personnal microsoft account, therefore not related to the AD before I invited myself. When double-checking in the AD, I can see that my personnal email is flagged as invited: I tried another account (my github one). Following the sign-in process, I first got this error message:
Therefore I invited this account, which looks as straightforward as it could be :) I go through the invitation process and hit the same error as before, because the tenant id is the same as the AD. What could explain is that I had to kind of register into Hymexia AD during the the invitation process, including setting a password (which makes no sense since I have then logged with my github account) End of the story: I am definitively lacking knowledge on Azure AD itself... 🙄 |
Hi folks,
Firstofall, thanks for the amazing lib. I find it clean and efficient. 🤩
Documentation is great too, and I could setup the basics in Azure thanks to the explicit tutorial. Thanks a lot !
I wanted to go further, and I was looking for setting up user rights through
BOOLEAN_CLAIM_MAPPING
, and I am hitting the Azure wall of a-kilometer-high documentation.Hence my question : could you add a section in the doc that describes the steps...
🧭 Status Point
Here are my findings of the last 24 hours trying to make it work on my own (being completely newbie with Azure)
I started from the settings reference in the project doc, about
BOOLEAN_CLAIM_MAPPING
I did not find such section in the Azure AD I created, neither in the Azure AD B2C :(
📔 Regarding AD:
The posts I have found redirect to the token configuration page, showing how to add optional claims, but only existing ones apparently...
Therefore I searched how to define my claims, i.e. my new attributes on the users, but I only found an azure feature custom security attribute which require a license and is still in PREVIEW.
It appears I am not on the good track
📚 Therefre I looked at AD B2C:
There, it looks simple to adjust the user attribute configuration (only availalbe on AD B2C though)
But... there is no "token configuration" page as mentioned in a lot of places. I found the reason in the Microsoft doc
Regarding the claims token configuration, it appears that I have to use user flows or policies (https://docs.microsoft.com/en-us/azure/active-directory-b2c/configure-tokens?pivots=b2c-user-flow)
But that did not look like the way to go either
🕵️♂️ Conclusion:
I am pretty sure I am just getting lost in Azure labyrithn and missing an obvious configuration.
Hence the my issue, and the suggestion about extending the Tutorial :)
If this process sounds trivial or is well-known to anyone, I am glad for any help
Cheers,
Emmanuel
The text was updated successfully, but these errors were encountered: