You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: content/en/docs/reference/configuration/registration/_index.md
+38-17Lines changed: 38 additions & 17 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -24,7 +24,6 @@ a volume providing this file must be mapped into the container.
24
24
The contents in this file must be under the following hierarchy:
25
25
26
26
```yaml
27
-
28
27
iam:
29
28
registration:
30
29
```
@@ -42,7 +41,6 @@ It also defines how information from identity tokens issued by CERN SSO is
42
41
mapped to IAM membership information
43
42
44
43
```yaml
45
-
46
44
iam:
47
45
registration:
48
46
require-external-authentication: true
@@ -86,6 +84,29 @@ when it is required.**
86
84
`external-auth-attribue`must be the name of the IdP attribute, or token claim (when provided by SAML IdPs,
87
85
or OIDC Providers, respectively) to use for the mentioned account creation form field.
88
86
87
+
88
+
## Automatic enrollment through SAML IdPs
89
+
90
+
In case of registration through an external SAML Identity Provider, IAM offers
91
+
a flexible user enrollment flow, also without IAM admin intervention. The default IAM
92
+
behavior is that the user enrollment requires an administrator approval step.
93
+
94
+
In order to enable the automatic enrollment flow via an external IdP, one
95
+
should set the following properties, under the `saml` hierarchy:
96
+
97
+
```yaml
98
+
saml:
99
+
jit-account-provisioning:
100
+
enabled: true
101
+
# this will consider as trusted all the IdPs declared in your
102
+
# application-saml.yml file
103
+
trusted-idps: all
104
+
```
105
+
106
+
In order to directly declare the list of trusted SAML IdPs, a comma separated list of
107
+
entity IDs have to be set, e.g. `saml.jit-account-provisioning.trusted-idps=idp1,idp2,idp3`.
108
+
109
+
89
110
## User editable fields
90
111
91
112
Starting with version 1.6.0, IAM allows to limit which fields of the user profile are editable by users.
@@ -94,7 +115,6 @@ The default, backward-compatible settings that allow users to edit all their
94
115
profile fields are defined as follows:
95
116
96
117
```yaml
97
-
98
118
iam:
99
119
user-profile:
100
120
editable-fields:
@@ -111,25 +131,26 @@ External configuration can be managed by placing directives as shown above in a
111
131
[custom configuration
112
132
file][custom-config-file]
113
133
114
-
## Automatic enrollment trough SAML IdPs
115
134
116
-
In case of registration trough an external SAML Identity Provider, IAM offers
117
-
a flexible user enrollment flow, also without IAM admin intervention. The default IAM
118
-
behavior is that the user enrollment requires an administrator approval step.
135
+
## Automatically set the nickname as attribute
119
136
120
-
In order to enable an automatic enrollment flow trough an external IdP, one
121
-
should set the following properties, under the `saml` hierarchy:
137
+
Since IAM v1.9.0, during a registration request the username can be automatically added as an attribute named _nickname_. This process happens both for login with external provider, or when one directly clicks on the
138
+
_Apply for an account_ button.
139
+
The _nickname_ value will be the same as the username set during the registration request.
140
+
141
+
This behavior does not appear by default. To enable it, add to your config file
122
142
123
143
```yaml
124
-
saml:
125
-
jit-account-provisioning:
126
-
enabled: true
127
-
# this will consider as trusted all the IdPs declared in your
128
-
# application-saml.yml file
129
-
trusted-idps: all
144
+
iam:
145
+
registration:
146
+
add-nickname-as-attribute: true
130
147
```
131
148
132
-
In order to directly declare the list of trusted SAML IdPs, a comma separated list of
133
-
entity IDs have to be set, e.g. `saml.jit-account-provisioning.trusted-idps=idp1,idp2,idp3`.
149
+
or set the environment variable `IAM_ADD_NICKNAME_AS_ATTRIBUTE=true`.
150
+
151
+
Once the new IAM user has been created, the _Attributes_ view from the dashboard looks like the following
0 commit comments