Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Allow auth for OIDC tokens that do not contain a group claim #269

Open
caleb-devops opened this issue Jan 19, 2024 · 0 comments
Open

Allow auth for OIDC tokens that do not contain a group claim #269

caleb-devops opened this issue Jan 19, 2024 · 0 comments

Comments

@caleb-devops
Copy link

I am using Microsoft Entra ID for OIDC authentication to Vault, but I'm unable to authenticate with a user that is not a member of any groups. My Vault JWT role is configured to look for a groups_claim, however, Vault presents the following error if the claim is not included with the token:

failed to fetch groups: "groups" claim not found in token

Microsoft Entra ID doesn't send any configured claims if the attribute carries no value in it, so users that are not a member of a group are unable to authenticate to Vault.

Can vault-plugin-auth-jwt be updated to authenticate users when the group attribute is missing from the token? In such cases, I would like users to be assigned the default policy that was configured for the JWT role.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant