Movatterモバイル変換


[0]ホーム

URL:


Skip to content

Navigation Menu

Sign in
Appearance settings

Search code, repositories, users, issues, pull requests...

Provide feedback

We read every piece of feedback, and take your input very seriously.

Saved searches

Use saved searches to filter your results more quickly

Sign up
Appearance settings

docs: update IdP group and role sync documentation for UI configuration#16315

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to ourterms of service andprivacy statement. We’ll occasionally send you account related emails.

Already on GitHub?Sign in to your account

Merged
EdwardAngert merged 11 commits intomainfrom277-idp-sync-dash
Jan 31, 2025

Conversation

EdwardAngert
Copy link
Contributor

@EdwardAngertEdwardAngert commentedJan 28, 2025
edited
Loading

closescoder/internal#277

to do:

  • deprecate server flag steps
  • bump down tab headings (remove from toc)
  • add dashboard steps for each

- [ ] re-org doc partially complete, but this will need revisiting

preview

@EdwardAngertEdwardAngert added the docsArea: coder.com/docs labelJan 28, 2025
@EdwardAngertEdwardAngert self-assigned thisJan 28, 2025
@EdwardAngertEdwardAngert changed the titledocs: Update docs for IDP group and role sync to reflect the ability to configure in the UIdocs: update IDP group and role sync documentation for UI configurationJan 28, 2025
authenticates using OIDC, the application requests offline access to the user's
resources, including the ability to refresh access tokens without requiring the
user to reauthenticate.
The `access_type` parameter has two possible values: `online` and `offline`.
Copy link
ContributorAuthor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others.Learn more.

I tried looking for more information about this and foundhttps://registry.terraform.io/providers/mrparkers/keycloak/latest/docs/resources/openid_client

Based on that, there are other options and neitheronline noroffline are listed. Is this wording still accurate?

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others.Learn more.

Probably best revisiting this after merge too.

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others.Learn more.

Those are the wrong docs, it will not be a terraform resource.

I cannot find the correct docs though. This is the best I found
https://wjw465150.gitbooks.io/keycloak-documentation/content/server_admin/topics/sessions/offline.html

Copy link
ContributorAuthor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others.Learn more.

nice find@Emyrk !

I found the source of that page, then traced it back to thekeycloak docs - seems like it's the same info

glancing at their docs, the parameter isscope=offline_access and maybe notaccess_type, so it seems like it's still worth exploring our Keycloak section later

Clients can request an offline token by adding the parameterscope=offline_access when sending their authorization request to Keycloak.

that doc also links tohttps://openid.net/specs/openid-connect-core-1_0.html#OfflineAccess

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others.Learn more.

It is worth explorig. The scope is different than the query param in the auth url.

The url param is defined in the OIDC spechttps://developers.google.com/identity/openid-connect/openid-connect. Unsure if it is an oauth thing, or an oidc thing.

The oauth library we use has it defined:
https://github.com/golang/oauth2/blob/master/oauth2.go#L109-L121

As for what the scope does, I am unsure. It might be related to the query param, idk 🤷‍♂️.

EdwardAngert reacted with eyes emoji
Comment on lines 610 to 612
- `preferred_username`: You can use e.g. "Display Name" as required.
- `email`: You can use e.g. the LDAP attribute "E-Mail-Addresses" as
required.
Copy link
ContributorAuthor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others.Learn more.

are these"Display Name" and"E-Mail-Addresses" values from somewhere? I'm trying to reword these points

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others.Learn more.

Probably worth cleaning up this section as a separate PR. Unsure who wrote it, we can usegit blame

@EdwardAngertEdwardAngert changed the titledocs: update IDP group and role sync documentation for UI configurationdocs: update IdP group and role sync documentation for UI configurationJan 29, 2025
@EdwardAngertEdwardAngert marked this pull request as ready for reviewJanuary 30, 2025 05:41
Comment on lines 50 to 51
For deployments with multiple [organizations](./organizations.md), configure
group sync at the organization level.
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others.Learn more.

Even single org deployments have to configure it at the org level. They just configure it in the default org.

EdwardAngert reacted with thumbs up emoji
Copy link
Member

@bpmctbpmctJan 31, 2025
edited
Loading

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others.Learn more.

@jaaydenh Do single org deployments on the Standard license see this UI?

Copy link
ContributorAuthor

@EdwardAngertEdwardAngertJan 31, 2025
edited
Loading

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others.Learn more.

yeah:

2025-01-31_13-37-50

we're trying to remind people that if you have more than one, configure it in the appropriate org. Let me see if I can rework this a little

bpmct reacted with thumbs up emoji
Copy link
ContributorAuthor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others.Learn more.

just in case, here's a screenshot of people see if they don't have a premium license

2025-01-31_14-13-34

authenticates using OIDC, the application requests offline access to the user's
resources, including the ability to refresh access tokens without requiring the
user to reauthenticate.
The `access_type` parameter has two possible values: `online` and `offline`.
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others.Learn more.

Those are the wrong docs, it will not be a terraform resource.

I cannot find the correct docs though. This is the best I found
https://wjw465150.gitbooks.io/keycloak-documentation/content/server_admin/topics/sessions/offline.html

Copy link
Member

@bpmctbpmct left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others.Learn more.

LGTM! Thanks Edward :)

EdwardAngert reacted with hooray emoji
@EdwardAngertEdwardAngertenabled auto-merge (squash)January 31, 2025 20:34
@EdwardAngertEdwardAngert merged commit92a490b intomainJan 31, 2025
28 checks passed
@EdwardAngertEdwardAngert deleted the 277-idp-sync-dash branchJanuary 31, 2025 20:39
@github-actionsgithub-actionsbot locked and limited conversation to collaboratorsJan 31, 2025
Sign up for freeto subscribe to this conversation on GitHub. Already have an account?Sign in.
Reviewers

@bpmctbpmctbpmct approved these changes

@jaaydenhjaaydenhAwaiting requested review from jaaydenh

@stirbystirbyAwaiting requested review from stirby

@EmyrkEmyrkAwaiting requested review from Emyrk

Assignees

@EdwardAngertEdwardAngert

Labels
docsArea: coder.com/docs
Projects
None yet
Milestone
No milestone
Development

Successfully merging this pull request may close these issues.

Update docs for IDP group and role sync to reflect the ability to configure in the UI
3 participants
@EdwardAngert@Emyrk@bpmct

[8]ページ先頭

©2009-2025 Movatter.jp