mirror of
https://github.com/hashicorp/vault.git
synced 2025-11-23 19:51:09 +01:00
auth/oidc: add extra context about claim names in doc (#16987)
This commit is contained in:
parent
7b98e2e30f
commit
c60394062d
@ -95,8 +95,24 @@ You should set up a [Vault policy](https://learn.hashicorp.com/tutorials/vault/p
|
|||||||
|
|
||||||
### Optional Azure-specific Configuration
|
### Optional Azure-specific Configuration
|
||||||
|
|
||||||
If a user is a member of more than 200 groups (directly or indirectly), extra configuration
|
If a user is a member of more than 200 groups (directly or indirectly), Azure will
|
||||||
is required so that Vault can fetch the groups properly.
|
send `_claim_names` and `_claim_sources`. For example, returned claims might look like:
|
||||||
|
|
||||||
|
```json
|
||||||
|
{
|
||||||
|
"_claim_names": {
|
||||||
|
"groups": "src1"
|
||||||
|
},
|
||||||
|
"_claim_sources": {
|
||||||
|
"src1": {
|
||||||
|
"endpoint": "https://graph.windows.net...."
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
```
|
||||||
|
|
||||||
|
The OIDC auth method role can be configured to include the user ID in the endpoint URL,
|
||||||
|
which will be used by Vault to retrieve the groups for the user:
|
||||||
|
|
||||||
- In Azure, under the applications **API Permissions**, grant the following permissions:
|
- In Azure, under the applications **API Permissions**, grant the following permissions:
|
||||||
- Microsoft Graph API permission [Directory.Read.All](https://docs.microsoft.com/en-us/graph/permissions-reference#application-permissions-19)
|
- Microsoft Graph API permission [Directory.Read.All](https://docs.microsoft.com/en-us/graph/permissions-reference#application-permissions-19)
|
||||||
|
|||||||
Loading…
x
Reference in New Issue
Block a user