You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
A clear and concise description of what you want to accomplish.
Currently there is no way to do ACL authorization on custom fields. E.g on Auth0 it is not allowed to specify the roles field in a token so we put it in https://example.org/roles, but the ACL will not see this field. This is because there is a distinction in the User type. The fields in tkv are accessible in the ACL but fields in the mkv map not. (Authorization uses this
Is there a specific reason to have this distinction? Couldn't we just expose the whole mkv for the authorization?
I would be happy to write a patch, but I'm not sure how to best solve this.
Thanks a lot for your feedback.
The text was updated successfully, but these errors were encountered:
Digging deeper I realized that we can't really determine the data type in this case, and we would just fail to parse the ACL.
Not sure what's the best solution to this. It would be great if there would be someway to "rewrite" properties in the token before doing the ACLing. But not sure how this would be plugged in the nicest way.
Currently there is no way to do ACL authorization on custom fields. E.g on Auth0 it is not allowed to specify the
roles
field in a token so we put it inhttps://example.org/roles
, but the ACL will not see this field. This is because there is a distinction in theUser
type. The fields intkv
are accessible in the ACL but fields in themkv
map not. (Authorization uses thisgo-authcrunch/pkg/user/user.go
Line 194 in eb8b39e
Is there a specific reason to have this distinction? Couldn't we just expose the whole
mkv
for the authorization?I would be happy to write a patch, but I'm not sure how to best solve this.
Thanks a lot for your feedback.
The text was updated successfully, but these errors were encountered: