-
Notifications
You must be signed in to change notification settings - Fork 4.7k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Group ID instead of Group Name when using Azure AD OICD #12178
Comments
It is related to the group claim setting in your OIDC provider configuration. |
Azure doesn't support using the group name in the id token for AAD groups because the group name might not be unique. To use group names we'd need to use the azure api to fetch the groups with their ids. I'd be willing to put a couple of days of work in to create a PR to do this, but since this would be an Azure specific solution, would it actually be considered for merging? Edit: This would be needed to fetch all groups: https://docs.microsoft.com/en-us/graph/api/group-list?view=graph-rest-1.0 |
I'm all for Yaron's proposal. @reasonerjt can you consider this would be useful to include? |
@yaron However, for simplicity and maintainability, we want to keep a unified workflow for all OIDC providers. Such that in the pipeline we'll only test dex . Currently there's no plan to add specific logic for different OIDC vendor. |
I missed this at first, but it should be possible through dex. So there's two possibilities here
I don't know which is the case. I hope I'll have some time to test this next week, but if you could take a look at that page and check the implementation you'd probably know much faster. |
This issue has been automatically marked as stale because it has not had recent activity. It will be closed if no further activity occurs. Thank you for your contributions. |
Would be happy to see this as well if possible |
@reasonerjt would it be possible to add a description field to groups in the UI? That way you don't have to change OIDC logic, but for end-users there will be an option to look up group name once in Azure and save it to harbor UI for future reference/management. |
This issue has been automatically marked as stale because it has not had recent activity. It will be closed if no further activity occurs. Thank you for your contributions. |
Are we able to get an update on @yaron 's suggested fix for this? Not having group names is causing headaches for managing our Harbor instance(s). Currently we have to copy/paste and ask around for what different GUIDs mean. For reference - the above enhancement seems to be used by other products. For example, we use Rancher with our same Azure AD and it requests graph api access, users and groups come through beautifully. How can we push to get this implemented with Harbor? |
This issue has been automatically marked as stale because it has not had recent activity. It will be closed if no further activity occurs. Thank you for your contributions. |
Ping on this issue, this makes managing access with Azure AD groups difficult. |
This issue is being marked stale due to a period of inactivity. If this issue is still relevant, please comment or remove the stale label. Otherwise, this issue will close in 30 days. |
This issue was closed because it has been stalled for 30 days with no activity. If this issue is still relevant, please re-open a new issue. |
A low effort workaround could be an ability to attach metadata to an OIDC group in Harbor, e.g. a tag or a comment. If I had the GUI spit out a tag/comment for me, next to the UUID, it would make life much easier for me. |
We found a feasible workaround for displaying the Group Name instead of the UUID. We configured our Azure AD application to send the names instead of the UUIDs. We had to manually edit the Manifest via {
// ...
"optionalClaims":{
// ...
"idToken":[
// ...
{
"name": "groups",
"source": null,
"essential": false,
"additionalProperties": [
"cloud_displayname"
]
}
]
// ...
}
} |
looks like this does not work for the admin group ? or did you also change "accesstoken" & "saml2Token" in the manifest |
combination with changing the manifest and keeping an app role for the admin group seems to do the job |
I just tested it with a new AAD application which has no app roles and using the admin group works like expected. However, I had some troubles when I used my old application that previously used app roles. EDIT: The users page still displays "Unknown" in the administrator column. |
Can you explain why in the Groups tab I only see the ID instead of the name when I use Azure AD as OICD. Is this the fault of the Token configuration I get from Azure? I've tried all the configurations but none work.
Problem occurs for both 1.x and 2.0 versions
The text was updated successfully, but these errors were encountered: