Skip to content

Add support to ensure user belongs in required groups when using the Azure provider #888

@mjiderhamn

Description

@mjiderhamn

Expected Behavior

The same group membership check that was implemented for the oidc provider in #616 should be made available for the azure provider.

Workaround

--provider=oidc
--oidc-issuer-url=https://sts.windows.net/[Tenant ID]/
--skip-oidc-discovery=true
--login-url=https://login.windows.net/[Tenant ID]/oauth2/authorize?resource=https%3A%2F%2Fgraph.microsoft.com
--redeem-url=https://login.windows.net/[Tenant ID]/oauth2/token
--oidc-jwks-url=https://login.windows.net/common/discovery/keys
--profile-url=https://graph.microsoft.com/v1.0/me
--user-id-claim=userPrincipalName
--allowed-group=[Group GUID]

Your Environment

  • Version used: built from commit 8abc4e6

Metadata

Metadata

Assignees

No one assigned

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions