-
-
Notifications
You must be signed in to change notification settings - Fork 14
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
verified_email Claim #85
Comments
Hey, While technically possible, since this is a well-defined claim present in the spec; I don't plan to add alternative ways to support it at the moment. Edit: If you can manually add claims does it prevent you to name it |
Unfortunately its not possible to add claims to azure manually. I think you can only choose predefined claims to use. |
I won't pretend that I know how Entra works but some documentation appears to mention the |
I'm sorry I never used Entra so I won't be able to help you with it. I mentioned it because I don't remember for which provider It's not mentioned in SSO.md#microsoft-entra-id and I believe multiple people were successful in configuring Entra. |
I followed this instruction but yea as i said this claim is not visible and i also cant add custom claims or something. I will keep searching for it :) |
Hello, @Timshel and @gjuuz If SSO can do sign-up like just-in-time provisioning, it would be very nice. To use OIDC custom claims with EntraID, open "Enterprise Applications" in the Azure Portal, and add or change them in "Attributes and Claims" from "Single Sign-On" for the application.
You can also set custom claims on the command line using the Graph API.
I tried customizing the claims each way, and both times OIDCWarden raised the same following error. Thanks! |
Signup is supported, and I was not aware of any specific issue with Entra up to this point.
This is expected since the |
I think it's possible to define and return a boolean by combining directory schema extensions, but you'd have to define the schema value for every user, which would be tedious in a large organization. Solution: |
this will not work cause vaultwarden is expecting a boolean. |
I think he is probably asking for that functionality not for EntraID but for Vaultwarden (OIDCwarden). |
misunderstood sorry :) |
Since the parsing of the default claims is done by the underlying library, which quite strict, it would not be so trivial to implement. But even if it was, as mentioned before this is a well-defined field in the spec, so in general I have no plan to add workaround for a specific provider. |
A better solution would be to ask Microsoft to either fix EntraID's OIDC to comply with the spec, or to add support for boolean types... |
Hey I did not test it, and you'll have to make your own build, but it might still help :) |
Vaultwarden Support String
unfortunately i dont get sign up via sso working with azure idp. I have to setup SSO_ALLOW_UNKNOWN_EMAIL_VERIFICATION=true to get this working but i want to avoid this. Token Claim verified_email is not available within Azure. I can setup verified_primary_email but is it possible to also accept this claim in the sso process ?
BR
Vaultwarden Build Version
Deployment method
Official Container Image
Custom deployment method
No response
Reverse Proxy
Host/Server Operating System
Linux
Operating System Version
No response
Clients
Web Vault
Client Version
No response
Steps To Reproduce
Expected Result
Actual Result
Logs
No response
Screenshots or Videos
No response
Additional Context
No response
The text was updated successfully, but these errors were encountered: