You signed in with another tab or window.Reload to refresh your session.You signed out in another tab or window.Reload to refresh your session.You switched accounts on another tab or window.Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/admin/users/idp-sync.md
+49-43Lines changed: 49 additions & 43 deletions
Original file line number
Diff line number
Diff line change
@@ -307,19 +307,24 @@ Visit the Coder UI to confirm these changes:
307
307
If your OpenID Connect provider supports groups/role claims, you can configure
308
308
Coder to synchronize claims in your auth provider to organizations within Coder.
309
309
310
-
Viewing and editing the organization settings requires deployment admin permissions (UserAdmin or Owner).
310
+
Viewing and editing the organization settings requires deployment admin
311
+
permissions (UserAdmin or Owner).
311
312
312
-
Organization sync works across all organizations. On user login, the sync will add and remove the user from organizations based on their IdP claims. After the sync, the user's state should match that of the IdP.
313
+
Organization sync works across all organizations. On user login, the sync will
314
+
add and remove the user from organizations based on their IdP claims. After the
315
+
sync, the user's state should match that of the IdP.
313
316
314
-
You can initiate an organization sync through the CLI or through the Coder dashboard:
317
+
You can initiate an organization sync through the CLI or through the Coder
318
+
dashboard:
315
319
316
320
<div class=”tabs”
317
321
318
322
## CLI
319
323
320
324
Use the Coder CLI to show and adjust the settings.
321
325
322
-
These deployment-wide settings are stored in the database. After you change the settings, a user's memberships will update when they log out and log back in.
326
+
These deployment-wide settings are stored in the database. After you change the
327
+
settings, a user's memberships will update when they log out and log back in.
323
328
324
329
1. Show the current settings:
325
330
@@ -334,7 +339,8 @@ These deployment-wide settings are stored in the database. After you change the
334
339
}
335
340
```
336
341
337
-
1. Update with the JSON payload. In this example, `settings.json` contains the payload:
342
+
1. Update with the JSON payload. In this example, `settings.json` contains the
343
+
payload:
338
344
339
345
```console
340
346
coder organization settings set org-sync < settings.json
@@ -355,60 +361,60 @@ These deployment-wide settings are stored in the database. After you change the
355
361
356
362
Analyzing the JSON payload:
357
363
358
-
| Field | Explanation |
359
-
|:--|:--|
360
-
| field | If this field is the empty string `""`, then org-sync is disabled. </br> Org memberships must be manually configured through the UI or API.|
361
-
| mapping | Mapping takes a claim from the IdP, and associates it with 1 or more organizations by UUID. </br> No validation is done, so you can put UUID's of orgs that do not exist (a noop). The UI picker will allow selecting orgs from a drop down, and convert it to a UUID for you. |
| field| If this field is the empty string `""`, then org-sync is disabled. </br> Org memberships must be manually configured through the UI or API.|
367
+
| mapping| Mapping takes a claim from the IdP, and associates it with 1 or more organizations by UUID. </br> No validation is done, so you can put UUID's of orgs that do not exist (a noop). The UI picker will allow selecting orgs from a drop down, and convert it to a UUID for you. |
362
368
| organization_assign_default | This setting exists for maintaining backwards compatibility with single org deployments, either through their upgrade, or in perpetuity. </br> If this is set to 'true', all users will always be assigned to the default organization regardless of the mappings and their IdP claims. |
363
369
364
370
## Dashboard
365
371
366
-
First, confirm that your OIDC provider is sending claims by loggingin with
367
-
OIDC and visiting the following URL with an `Owner` account:
372
+
1. Confirm that your OIDC provider is sending claims. Login with OIDC and visit