You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
If a user is added through Oauth, or merges to oauth login and is subsequently deactivated in the central
IdP this deactivation does not propagate to Redmine.
Imagine this case:
User exists in Redmine
Admin migrates to oauth login (by tightening password rules that much, its uncomfortable to login using password)
User gets centrally deactivated in the Oauth provider
User still is able to change its password and login to redmine
I don't know what a proper solution would be to propagate the deactivation of the user to redmine,
and its interesting for other SSO services too. You would expect, that by centrally disabling a user
it becomes inactive on all connected services, or wouldn't you?
The text was updated successfully, but these errors were encountered:
It seems there exists a specification for a user synchronization in https://scim.cloud/
It would however be already of advantage, if we could FORCE users to use oauth2 login only. Lets say,
users have to use oauth2 login. This plugin could feature a ruby script that enables/disables this feature.
Lets say I execute
ruby lockdown on the system as script - now login is generally only possible via oauth2
ruby release on the system as script - both login paths are open again
Maybe there could be some sort of login type restriction for users implemented, so that oauth users (the users created with oauth or merged and logged in with oauth) are restricted from logging in with the password. i can't think of how it can be imlemented for now.
If a user is added through Oauth, or merges to oauth login and is subsequently deactivated in the central
IdP this deactivation does not propagate to Redmine.
Imagine this case:
I don't know what a proper solution would be to propagate the deactivation of the user to redmine,
and its interesting for other SSO services too. You would expect, that by centrally disabling a user
it becomes inactive on all connected services, or wouldn't you?
The text was updated successfully, but these errors were encountered: