Marcial Rosales
Marcial Rosales
It appears this issue with the colon on the user-tag's actions is a blocker because the identity provider does not tolerate colons on the action's values. To overcome this issue...
Thanks a lot @davidknezic !! Very happy that you have validated the PR. is **Auth0** your Idp in production? or is it **IdentifyServer4**?
@ngbrown We are in the process of testing against more providers. Auth0 is already tested. You can check it out [here](https://github.com/rabbitmq/rabbitmq-oauth2-tutorial#use-case-8-use-external-oauth-server-httpsauth0com). However, we have only tested it against the messaging...
Hi @ngbrown , we are working on supporting **scope mapping** so that your tokens may carry scopes in any format your Idp requires and yet we can configure RabbitMQ to...
HI @baptistedaroit. we are currently working on a new version of the management plugin and the oauth2 plugin precisely because of the issues you are experiencing. For your reference, this...
@baptistedaroit definitely you are very welcome to expand the tutorial. Did you get it to work using the official docker image? or did you use the oidc-integration branch that I...
Awesome ! @baptistedaroit . In that case, feel free to create a PR to add another integration use case, in your case Azure. You know that we have under `use-cases`...
@baptistedaroit Thank you so much for the amount of work you have put !! I am reviewing it today.
This issue is addressed by this [PR](https://github.com/rabbitmq/rabbitmq-server/pull/6015) . We are now able to tell which token's claim or attribute carries the username . @michaelklishin
@devansharora68 are you still interested on this feature? or can we close it? To implement it, we suggest adding a new setting where you can configure which variables should be...