-
Notifications
You must be signed in to change notification settings - Fork 89
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add User ID Attribute Type for AzureAD Connections #1006
Comments
This seems to be a bug rather than a feature |
Agree that this is a bug. From an API view (GET https://tenant.eu.auth0.com/api/v2/connection) the The next time we perform a
We assume that despite this showing as |
user_id_attribute
support to AzureAD connection options in Connection Manager
auth0/go-auth0#445
I've just tried version 1.7.0 and even if I set up "oid" in terraform it still sets the value to "sub" during terraform apply and I have to change it manually after each CD pipeline. In terraform we set:
Get Connection call from Management API returns this (after I manually changed "sub" to "oid" in the dashboard)
Is it possible it doesn't work because of a difference in properties' names? |
@rwyr I tried creating a new connection with the below and then updated the value from The naming convention resource "auth0_connection" "azure_ad" {
name = "Acceptance-Test-Azure-AD-sample"
strategy = "waad"
show_as_button = true
options {
identity_api = "azure-active-directory-v1.0"
client_id = "123456"
client_secret = "123456"
strategy_version = 2
tenant_domain = "example.onmicrosoft.com"
domain = "example.onmicrosoft.com"
domain_aliases = [
"example.com",
"api.example.com"
]
use_wsfed = false
waad_protocol = "openid-connect"
waad_common_endpoint = false
user_id_attribute = "oid"
api_enable_users = true
scopes = [
"basic_profile",
"ext_groups",
"ext_profile"
]
set_user_root_attributes = "on_each_login"
should_trust_email_verified_connection = "never_set_emails_as_verified"
upstream_params = jsonencode({
"screen_name": {
"alias": "login_hint"
}
})
}
} |
Yes, it's been fixed in v1.7.1 |
Checklist
Describe the problem you'd like to have solved
Need to be able to set the User ID Attribute Type on Azure AD Connections to oid to support SCIM. My existing connections that were provisioned through TF were all defaulted to sub.
Describe the ideal solution
One idea would be to extend the user_id_attribute used for samlp connections and allow either oid or sub for AzureAD connections.
Alternatives and current workarounds
None. Any update to the Connection will cause a null to be passed to the userid_attribute field which will reset the value back to sub - even though it retrieved the value as "oid" in the GET just before the PATCH.
Additional context
No response
The text was updated successfully, but these errors were encountered: