-
Notifications
You must be signed in to change notification settings - Fork 647
docs: add provider guide for entra #7977
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: main
Are you sure you want to change the base?
Conversation
✅ Deploy Preview for cerulean-figolla-1f9435 ready!
To edit notification comments on pull requests, go to your Netlify project configuration. |
538a2d3 to
130dfd5
Compare
Signed-off-by: Oliver Bähler <oliverbaehler@hotmail.com>
| jwt: | ||
| provider: entra | ||
| claims: | ||
| - name: roles |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Nit: could we keep consistent yaml list indentation?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Yes sir
Co-authored-by: Huabing (Robin) Zhao <zhaohuabing@gmail.com> Signed-off-by: Oliver Bähler <oliverbaehler@hotmail.com>
Signed-off-by: Oliver Bähler <oliverbaehler@hotmail.com>
| providers: | ||
| - name: entra | ||
| issuer: "https://login.microsoftonline.com/<AZURE_TENANT_ID>/v2.0" | ||
| remoteJWKS: |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
A bit of a random question as I am trying to setup similar thing using Zitadel. I assume the Idp should have attached the jwt after oidc step, so do we still need to have issuer or remoteJWKS configured, or can we rely on only extractFrom? Thanks.
What type of PR is this?
What this PR does / why we need it:
Would have saved me some hours if I would have known what to look for.
Essentially without this the v.1 token returned contains an iss property pointing to sts.microsoft.com. To get the v2. tokens you must use grant scopes.
Adds a simple example for using OIDC and JWT validating in with Azure Entra
Which issue(s) this PR fixes:
Fixes #
Release Notes: Yes/No