-
Notifications
You must be signed in to change notification settings - Fork 367
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[CILogon] Restrict access based on domain for username claims different than email #547
Comments
YESSS! I think perhaps an |
I propose we add |
@consideRatio, I don't know if this would work? A domain makes sense if we're talking about the And at the moment we can specify If we default this new config Instead, I believe with this new config
WDYT? |
Given that you two have been deep in the weeds of OAuthanticator, I'll leave it to y'all to figure out :) |
A domains check or any kind of check?
This has a history around domains specifically, and I think its too complicated to transition this config to generalize. For example, we have assumed that we handled "allowed domains", and then we can probably strip any parts before Change proposal discussed
It would fail, but it would be possible to re-configure it to succeed in such situations.
These are both breaking changes, and I don't want to make a breaking change yet. I suggest that we add @GeorgianaElena what do you think about that approach? If so, we could get a 16.2.0 release out quite soon and have oauthenticator bumped in z2jh etc quite soon as well. |
@consideRatio, personally, I am not convinced that half-solving an issue for the sake of synchronizing releases with other projects is the way to go, especially since we don't have a formal process set in place about it. But you are more engaged in z2jh and understand better the release process of that project, so I'm +1 on whatever you decide to do next in terms of releases. Let me know if there's anything I can do to help. |
Thank you @GeorgianaElena for the quick response! I tried to make a few implicit ideas about major releases explicit in jupyterhub/team-compass#696, where I think this change is suitable to be phased in by being opt-in initially before it ships out to everyone by default. |
Thinking about If we would switch to About mandatory to define I think making the new config mandatory could be reasonable. I appreciate how doing this would improve config readability and reduce implementation complexity a small bit. A downside is that it would require an intervention from users upgrading and be a breaking change forcing users attention when upgrading. @GeorgianaElena do you want us to take another action point as part of this issue? |
@consideRatio, no, I believe we can close this issue! |
Context
Currently, the
CILogonOAuthenticator
can restrict access based on domains, for usernames containing an@
👉🏼oauthenticator/oauthenticator/cilogon.py
Line 341 in b84fe8c
There are two small issues with this approach:
email
claim is used for the username, but this condition is not enforced.email
claim is used for the username, but domain based restriction is still desired.Proposed change
email
claim to restrict user's access even when other claims are user for the hub username.Who would use this feature?
The use-case that this come up in 2i2c land was the following:
oidc
claim for usernames, so that they are opaque for user privacyallowed
list or leave the hub open(Optional): Suggest a solution
The text was updated successfully, but these errors were encountered: