8000 roles mapping from azure entra id is not working · Issue #2128 · tchiotludo/akhq · GitHub
[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
Skip to content
8000

roles mapping from azure entra id is not working #2128

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Closed
youcefguichi opened this issue Mar 24, 2025 · 0 comments
Closed

roles mapping from azure entra id is not working #2128

youcefguichi opened this issue Mar 24, 2025 · 0 comments

Comments

@youcefguichi
Copy link

I setup akhq with azure entra id, the sso works fine and the user can logging, however mapping app roles from the entra app, to setup a proposer permissions is not working as expected / nor showing any logs that help me track the issue, can someone help me spot the issue? am i missing something?

/api/me

logged	true
username. "user@email.no"
roles:

Based on my understanding the akhq will extract app roles from the jwt and then map it to a group:

groups:
  - name: reader-test # this one is an app roles that should be injected in the jwt and akhq extract it from there
    groups:
      - topic-reader-test   

here is the full config:

configuration:
  akhq:
    security:
      enabled: true
      roles:
        topic-reader:
          - resources: [ "TOPIC", "TOPIC_DATA" ]
            actions: [ "READ" ]
          - resources: [ "TOPIC" ]
            actions: [ "READ_CONFIG" ]
      groups:
        topic-reader-test:
          - role: topic-reader
            patterns: [ "test.*" ]
        no-roles: []    
      oidc:
        enabled: true
        providers:
          azure:
            label: "Click here to Login with Azure"
            username-field: email
            groups-field: roles
            default-group: topic-reader
            groups:
              - name: reader-test # this one is an app roles that should be injected in the jwt and akhq extract it from there
                groups:
                  - topic-reader-test    
    server:
      access-log:
        enabled: true
        name: org.akhq.log.access
  micronaut:
    security:
      enabled: true
      oauth2:
        enabled: true
        clients:
          azure:
            client-id:  "<client-id>"
            client-secret: "<client-secret>"
            scopes:
              - openid
              - email
              - profile
            openid:
              issuer: "https://login.microsoftonline.com/tenant-id/v2.0"
@github-project-automation github-project-automation bot moved this to Backlog in Backlog Mar 24, 2025
@github-project-automation github-project-automation bot moved this from Backlog to Done in Backlog Mar 27, 2025
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
3C29 Projects
Status: Done
Development

No branches or pull requests

1 participant
0