-
Notifications
You must be signed in to change notification settings - Fork 4
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Gather detailed auth requirements #12
Comments
I considered both group and sub claims when implementing the OIDC primitives here: #49 The problem with groups is it doesn't give us the granularity we need for user specific policies. While sub-claim matching is certainly doable, it wasn't clear to me for now where we would get the sub-id number to match against. So for now I just used email addresses, that users can include in their astral request. We will need to investigate further with our users. |
Two questions:
|
being addressed by #68 |
#68 is done so i think we can close this one |
Assuming OIDC/JWT -- with
groups
claim orsub
(owner) matching the domain name of the request.But this may be complicated by service accounts or other auth types.
The text was updated successfully, but these errors were encountered: