Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

support access control using additional claims in id_token #19

Open
weinong opened this issue Jul 29, 2019 · 1 comment
Open

support access control using additional claims in id_token #19

weinong opened this issue Jul 29, 2019 · 1 comment

Comments

@weinong
Copy link

weinong commented Jul 29, 2019

in some OIDC provider such as Azure Active Directory it's possible to configure the client application to emit groups claim (or roles claim). For instance, this and that.
With these claims, we can implement access control so that only ones in the selected group can access the sensitive resources protected by Ambassador API gateway.

Since I have already implemented this feature in my fork, I'm happy to send a PR if you think it's useful.

@muscovitebob
Copy link

Hello @weinong would you be wiling to share a URL to this fork?

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants