-
Notifications
You must be signed in to change notification settings - Fork 2
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
feat: #1179 bceid login #1225
feat: #1179 bceid login #1225
Conversation
@MCatherine1994 I didn't understand your comment "Note: Our logout chain in local and dev connects with the dev environment, so the logout for test business bceid will only log the user out from Cognito but still have the sitemider session. " - why wouldn't local/dev logout chain be configured for the test business BCeID environment? Is that because the dev keycloak instance is only pointing at dev BCeID, not test? |
Hi Basil, that's just because for our local/dev environment, we suppose to use DEV-IDIR and DEV-BUSINESS-BCEID, and they work with the same DEV logout chain. But because we don't have dev bceid for testing, I setup to use DEV-IDIR and TEST-BUSINESS-BCEID for local/dev environment. So DEV-IDIR needs dev logout chain, but TEST-BUSINESS-BCEID needs test logout chain. |
This makes sense, just as long as this is documented somewhere in the dev configuration. |
…agement into feat/1179-bceid-login
…agement into feat/1179-bceid-login
Quality Gate passed for 'nr-forests-access-management_admin'Issues Measures |
refs: #1179
get_admin_user_access
doesn't need to check access group in the token, delegated admin won't have any access in the token. That API will return the access for the login user. Created a new router guard method to return requester data without check the access role in the token