Skip to content

Commit 363e8ee

Browse files
Add how to enable the automatic import of user's nickname as attribute (#119)
1 parent e6799f4 commit 363e8ee

File tree

2 files changed

+38
-17
lines changed

2 files changed

+38
-17
lines changed

content/en/docs/reference/configuration/registration/_index.md

Lines changed: 38 additions & 17 deletions
Original file line numberDiff line numberDiff line change
@@ -24,7 +24,6 @@ a volume providing this file must be mapped into the container.
2424
The contents in this file must be under the following hierarchy:
2525

2626
```yaml
27-
2827
iam:
2928
registration:
3029
```
@@ -42,7 +41,6 @@ It also defines how information from identity tokens issued by CERN SSO is
4241
mapped to IAM membership information
4342

4443
```yaml
45-
4644
iam:
4745
registration:
4846
require-external-authentication: true
@@ -86,6 +84,29 @@ when it is required.**
8684
`external-auth-attribue` must be the name of the IdP attribute, or token claim (when provided by SAML IdPs,
8785
or OIDC Providers, respectively) to use for the mentioned account creation form field.
8886

87+
88+
## Automatic enrollment through SAML IdPs
89+
90+
In case of registration through an external SAML Identity Provider, IAM offers
91+
a flexible user enrollment flow, also without IAM admin intervention. The default IAM
92+
behavior is that the user enrollment requires an administrator approval step.
93+
94+
In order to enable the automatic enrollment flow via an external IdP, one
95+
should set the following properties, under the `saml` hierarchy:
96+
97+
```yaml
98+
saml:
99+
jit-account-provisioning:
100+
enabled: true
101+
# this will consider as trusted all the IdPs declared in your
102+
# application-saml.yml file
103+
trusted-idps: all
104+
```
105+
106+
In order to directly declare the list of trusted SAML IdPs, a comma separated list of
107+
entity IDs have to be set, e.g. `saml.jit-account-provisioning.trusted-idps=idp1,idp2,idp3`.
108+
109+
89110
## User editable fields
90111

91112
Starting with version 1.6.0, IAM allows to limit which fields of the user profile are editable by users.
@@ -94,7 +115,6 @@ The default, backward-compatible settings that allow users to edit all their
94115
profile fields are defined as follows:
95116

96117
```yaml
97-
98118
iam:
99119
user-profile:
100120
editable-fields:
@@ -111,25 +131,26 @@ External configuration can be managed by placing directives as shown above in a
111131
[custom configuration
112132
file][custom-config-file]
113133

114-
## Automatic enrollment trough SAML IdPs
115134

116-
In case of registration trough an external SAML Identity Provider, IAM offers
117-
a flexible user enrollment flow, also without IAM admin intervention. The default IAM
118-
behavior is that the user enrollment requires an administrator approval step.
135+
## Automatically set the nickname as attribute
119136

120-
In order to enable an automatic enrollment flow trough an external IdP, one
121-
should set the following properties, under the `saml` hierarchy:
137+
Since IAM v1.9.0, during a registration request the username can be automatically added as an attribute named _nickname_. This process happens both for login with external provider, or when one directly clicks on the
138+
_Apply for an account_ button.
139+
The _nickname_ value will be the same as the username set during the registration request.
140+
141+
This behavior does not appear by default. To enable it, add to your config file
122142

123143
```yaml
124-
saml:
125-
jit-account-provisioning:
126-
enabled: true
127-
# this will consider as trusted all the IdPs declared in your
128-
# application-saml.yml file
129-
trusted-idps: all
144+
iam:
145+
registration:
146+
add-nickname-as-attribute: true
130147
```
131148

132-
In order to directly declare the list of trusted SAML IdPs, a comma separated list of
133-
entity IDs have to be set, e.g. `saml.jit-account-provisioning.trusted-idps=idp1,idp2,idp3`.
149+
or set the environment variable `IAM_ADD_NICKNAME_AS_ATTRIBUTE=true`.
150+
151+
Once the new IAM user has been created, the _Attributes_ view from the dashboard looks like the following
152+
153+
![Attributes view](./nickname-attribute.png)
154+
134155

135156
[custom-config-file]: {{< ref "/docs/reference/configuration/#overriding-default-configuration-templates" >}}
8.63 KB
Loading

0 commit comments

Comments
 (0)