Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

OpenID: Expose user info claims in Identity. #1964

Open
mickeykcyolo opened this issue Jan 26, 2021 · 1 comment
Open

OpenID: Expose user info claims in Identity. #1964

mickeykcyolo opened this issue Jan 26, 2021 · 1 comment

Comments

@mickeykcyolo
Copy link

Is your feature request related to a problem?

No.

Describe the solution you'd like to see

It would be really awesome and benefit all to add the claims data as []byte or string to connector.Identity.
This would enable developers the ability to scan the claims freely using JSONPath for example,
thus developers won't have to stick only to the basic exposed user attributes.

Describe alternatives you've considered

The only alternative I found is using the refresh token to get a new access/id token and then searching the id token for any custom attribute or making another request to user info.
This alternative is really bad as it is enforcing the client to enable the refresh token and enforcing us to use internal OpenID code outside of DEX.

Additional context

It could be relevant to SAML also. In this case the claims would be the SAML response xml as []byte or string.

Thanks for your great work on DEX,
Mickey

@candlerb
Copy link
Contributor

PR #1841, which is an implementation of middleware (#1635), adds CustomClaims to the connector.Identity struct as a map[string]interface{}

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants