user_saml
                                
                                 user_saml copied to clipboard
                                
                                    user_saml copied to clipboard
                            
                            
                            
                        Implement proper group mapping via SAML
Fixes #561
As stated in the issue, it's not desirable to have a group called admin in the SAML backend which doesn't indicate to which service admin permissions are granted.
This is orthogonal to saml-attribute-mapping-group_mapping which simply maps all groups from a SAML attribute to Nextcloud groups, i.e. the attribute's value MUST contain a group called admin to make sure that users get admin rights in Nextcloud.
When enabled, the name of (another) attribute must be specified which contains a list of SAML-specific groups, e.g.
["nextcloud-admins", "nextcloud-marketing"]
that can be mapped to e.g.
["admin", "marketing"]
cc @jgallucci32, @kevinmccurdybrd, @blizzz
Did you see https://github.com/nextcloud/user_saml/pull/545 which is being in development?
OK interesting, this wasn't referenced in #561. What I'm wondering is: why do you have separate groups for SAML and non-SAML? IIRC most applications have a simple mapping between users from $directory and existing groups (or newly created ones) which is what my solution does (in a more simple fashion and without any migration steps).
Woudl be interested in knowing the use-case behind that, though :)
Closing due to lack of interest.