My vault is working both with ldap and OIDC, no problem on config
My question is about OIDC. Today, it’s role who map groups linked to my idp who allow user with policy.
But on UX, it’s not easy to provide role, i mean user have to know which role they must set on the UI but it’s complex to maintain and to explain to users (could be QA, dev, functionnal guys…).
Is it possible to use only default role and like we have inside ldap, map a group to a policy with OIDC ?
I mean, user is log in with default role and if he is on group admin, match policy admin. If he is on feature “toto”, he have access to policy “toto” ?
In Vault create an “external” group named admins, attach the admin policy to that group, create a group alias mapping the OIDC group to the external group. Any OIDC user that is a member of the admin group will have the admin policy added automatically.
To explain for who need this feature. On my idp, I get back :
“support_groups”: [
“CS-1”,
“CS-2”,
“CS-3”
],
On my oidc role, I add “groups_claim”: “support_groups”
I add a group type external with name CS-2 for exemple with a policy and I add an alias on it to oidc.
So the groups will match what the idp send to me and associate a policy