mammoth-country-5949
07/28/2022, 1:02 AMmammoth-country-5949
07/28/2022, 1:06 AMselfservice:
default_browser_return_url: <https://ui.mydomain.com>
flows:
login:
ui_url: <https://ui.mydomain.com/login>
registration:
ui_url: <https://ui.mydomain.com/registration>
after:
oidc:
hooks:
- hook: session
settings:
ui_url: <https://ui.mydomain.com/settings>
error:
ui_url: <https://ui.mydomain.com/error>
methods:
password:
enabled: true
oidc:
enabled: true
config:
providers:
- id: my-tenant
provider: microsoft
client_id: xxx
client_secret: yyy
microsoft_tenant: <http://mytenant.onmicrosoft.com|mytenant.onmicrosoft.com>
mapper_url: file:///etc/config/oidc.microsoft.jsonnet
scope:
- profile
- email
steep-lamp-91158
mammoth-country-5949
07/28/2022, 2:41 PMkratos/self-service/methods/oidc/callback/my-name
mammoth-country-5949
07/28/2022, 2:41 PMmammoth-country-5949
07/28/2022, 2:47 PMsteep-lamp-91158
steep-lamp-91158
mammoth-country-5949
07/28/2022, 3:14 PMsteep-lamp-91158
mammoth-country-5949
07/28/2022, 5:57 PMlocal claims = {
role: 'user'
} + std.extVar('claims');
{
identity: {
traits: {
// Allowing unverified email addresses enables account
// enumeration attacks, especially if the value is used for
// e.g. verification or as a password login identifier.
//
// If connecting only to your organization (one tenant), claims.email is safe to use if you have not actively disabled e-mail verification during signup.
//
// The email might be empty if the account is not linked to an email address.
// For a human readable identifier, consider using the "preferred_username" claim.
[if "email" in claims then "email" else null]: claims.email,
role: claims.role
}
}
}
mammoth-country-5949
07/28/2022, 5:58 PMmammoth-country-5949
07/28/2022, 5:59 PMpreferred_username
claim insteadmammoth-country-5949
07/28/2022, 5:59 PMlocal claims = {
role: 'user'
} + std.extVar('claims');
{
identity: {
traits: {
// Allowing unverified email addresses enables account
// enumeration attacks, especially if the value is used for
// e.g. verification or as a password login identifier.
//
// If connecting only to your organization (one tenant), claims.email is safe to use if you have not actively disabled e-mail verification during signup.
//
// The email might be empty if the account is not linked to an email address.
// For a human readable identifier, consider using the "preferred_username" claim.
[if "preferred_username" in claims then "email" else null]: claims.preferred_username,
role: claims.role
}
}
}