Skip to content

Add OpenID/OAuth2 Role Mappings #12493

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Closed
ispringle opened this issue Aug 15, 2020 · 2 comments
Closed

Add OpenID/OAuth2 Role Mappings #12493

ispringle opened this issue Aug 15, 2020 · 2 comments
Labels
issue/duplicate The issue has already been reported.

Comments

@ispringle
Copy link

Description

I have my Gitea instance setup with OIDC and it works well. However at the moment anyone with an account in the realm Gitea accesses also has access to Gitea, regardless of their groups/roles/permissions. It's not a "break" for me as I don't mind providing Gitea access to all users, however I would like to be able to control it and especially control admin access or even organizational access from within my OIDC provider (keycloak in this case).

A lot of clients that use OpenID/Oauth2 allow to create roles and role mappings so you can assign a user a role in the identity manager and they automatically receive that role in the client application.

I am assuming that this would be a new feature request, as I haven't found this feature in Gitea, the docs, my web searching, or the code I've looked through thus far.

@Morriz
Copy link

Morriz commented Apr 19, 2021

I believe this is a dupe of #10016

@lunny
Copy link
Member

lunny commented Apr 19, 2021

Closed as duplicated.

@lunny lunny closed this as completed Apr 19, 2021
@lunny lunny added the issue/duplicate The issue has already been reported. label Apr 19, 2021
@go-gitea go-gitea locked and limited conversation to collaborators Jun 4, 2021
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
issue/duplicate The issue has already been reported.
Projects
None yet
Development

No branches or pull requests

3 participants