How to set Custom Scopes/Mappings/Properties/Permissions/Entitlements to OpenID/OAuth2 Application ? #16051
luckylinux
started this conversation in
General
Replies: 0 comments
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Uh oh!
There was an error while loading. Please reload this page.
Uh oh!
There was an error while loading. Please reload this page.
-
Introduction
I admit I'm a bit of a Loss on how to Configure custom Permissions for allowing some Users/Groups to access an Application. It should be IMHO relatively straightforward, but I find myself jumping between like 10 different Settings Section of the Admin Panel and nothing working.
Dashy Dashboard Access Control & Custom Properties
Case currently being considered is the
dashy
Dashboard.After struggling a lot being unable to save Configuration Changes to Disk due to apparently lacking Administrative Rights, I could finally see, after many Page Refreshes, the following in Network Console:
So apparently
dashy
requires a "special" (?) User Property / Attribute calledadmin
which must be set totrue
in order to grant Administrative Privileges within the Application.Now the Question is: how to do that ?
Application Entitlements
It seems that
Roles
are for controlling access to Authentik itself, so that's probably the one Thing I should NOT be looking at.What I did so far
dashy
OpenID Connect/OAuth2 Provider related to thedashy
Application underApplications
->Providers
->dashy
->Edit
-> `Advanced Protocol Settings:Applications
->Applications
->dashy
->Application Entitlements
for the Groupadmins
which includes my current User:Group Binding
inApplications
->Applications
->dashy
->Policy/Group/User Bindings
for the Groupadmins
which includes my current User:Customization
->Property Mappings
I configured aOAuth Source Property Mapping
Anyways, nothing is working right now, so obviously there is something wrong with the Configuration and most likely the Problem lies between the Chain and the Screen 🤣.
I see there are ways to add "groups" or expose "claims" etc, but is there a Way (and which is it ?) to set "root" level Properties ?
The
admin: false
that I saw in Network Console while trying to setup Dashy with Authentik OpenID Connect / OAuth2 seems to suggest it's a Top-Level / Root Property Key, thus I would expect that I need to setadmin: true
(YAML) orreturn { admin: True }
(Python) somewhere in Authentik 🤔 ...Beta Was this translation helpful? Give feedback.
All reactions