You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Add new azure flag to obtain groups from the oidc ticket
It is possible in azure to configure an optional claim such as groups.
In this case there is no need to make a request to Microsoft Graph api
to obtain groups. Instead azure will send the configured groups as a
part of oidc ticket directly. This is usefull when it is not possible to
obtain GroupMember.Read.All permissions for the applictaion.
Here we provide a new flag `azure-groups-in-ticket`, which does exactly
this. When the flag is set the request to the Graph api is not done and
instead the groups are taken from the session directly.
Copy file name to clipboardExpand all lines: docs/docs/configuration/overview.md
+1Lines changed: 1 addition & 0 deletions
Original file line number
Diff line number
Diff line change
@@ -74,6 +74,7 @@ An example [oauth2-proxy.cfg](https://github.com/oauth2-proxy/oauth2-proxy/blob/
74
74
|`--auth-logging-format`| string | Template for authentication log lines | see [Logging Configuration](#logging-configuration)|
75
75
|`--authenticated-emails-file`| string | authenticate against emails via file (one per line) ||
76
76
|`--azure-tenant`| string | go to a tenant-specific or common (tenant-independent) endpoint. |`"common"`|
77
+
|`--azure-groups-in-ticket`| bool | If true do not fetch groups from Microsoft graph api, but instead take them from the oidc ticket, see [docs](https://learn.microsoft.com/en-us/entra/identity-platform/optional-claims#configure-groups-optional-claims)|`false`|
77
78
|`--backend-logout-url`| string | URL to perform backend logout, if you use `{id_token}` in the url it will be replaced by the actual `id_token` of the user session ||
78
79
|`--basic-auth-password`| string | the password to set when passing the HTTP Basic Auth header ||
79
80
|`--client-id`| string | the OAuth Client ID, e.g. `"123456.apps.googleusercontent.com"`||
flagSet.StringSlice("keycloak-group", []string{}, "restrict logins to members of these groups (may be given multiple times)")
551
552
flagSet.String("azure-tenant", "common", "go to a tenant-specific or common (tenant-independent) endpoint.")
552
553
flagSet.String("azure-graph-group-field", "", "configures the group field to be used when building the groups list(`id` or `displayName`. Default is `id`) from Microsoft Graph(available only for v2.0 oidc url). Based on this value, the `allowed-group` config values should be adjusted accordingly. If using `id` as group field, `allowed-group` should contains groups IDs, if using `displayName` as group field, `allowed-group` should contains groups name")
554
+
flagSet.Bool("azure-groups-in-ticket", false, "configures server to take groups from azure oidc ticket. It is possible in azure to configure that the groups are sent as a part of oidc ticket. When true request to graph api is not performed and the groups are taken from the ticket.")
553
555
flagSet.String("bitbucket-team", "", "restrict logins to members of this team")
554
556
flagSet.String("bitbucket-repository", "", "restrict logins to user with access to this repository")
555
557
flagSet.String("github-org", "", "restrict logins to members of this organisation")
0 commit comments