Javier,
The attributes added to the OIDC Token are controlled by the logic in the pre- and post- mapping rules for the OAuth/OIDC definition in Verify Access.
These can be rather complex to figure out but if you simply want to have groups added to the OIDC token, you can add a single line to the pre-token mapping rule:
Find this line:
if (populate_id_token || save_cred_attrs) {
and add this right after it:
produceClaim("AZN_CRED_GROUPS", null, false, state_id, to_save);
This will cause the groups to always be added to the token.
Jon.
------------------------------
Jon Harry
Consulting IT Security Specialist
IBM
------------------------------
Original Message:
Sent: Wed October 14, 2020 04:35 AM
From: Javier Garcia Pazos
Subject: OIDC and IAG: iv-groups and rules
Hello Scott,
it helps. And now, my OP is ISAM (Security Verify Access). Do you know how I can add iv-groups?
Regards
------------------------------
Javier Garcia Pazos
Original Message:
Sent: Tue October 13, 2020 04:18 PM
From: Scott Exton
Subject: OIDC and IAG: iv-groups and rules
Javier,
You need to ensure that a claim which contains iv-groups is created at the OP, and is then added to the credential by the RP. From your configuration it looks like the RP (aka IAG) is adding the majority of the claims from the token to the credential. So, I would enable the creds viewer application (
https://iamdevportal.us-east.mybluemix.net/iag/references/yaml/server/local-applications/cred-viewer), authenticate, and then access the creds-viewer application to see what credentials are available. If the group information is missing the OP needs to be updated to include the group information in the identity token.
I hope that this helps.
Scott A. ExtonSenior Software Engineer
Chief Programmer - IBM Security Verify AccessIBM Master Inventor
|
Phone: 61-7-5552-4008 E-mail: scotte@au1.ibm.com | 1 Corporate Court Bundall, QLD 4217 Australia |
Original Message:
Sent: 10/13/2020 9:36:00 AM
From: Javier Garcia Pazos
Subject: OIDC and IAG: iv-groups and rules
Hello,
I am trying IAG and I think it works very well. Now I would like to apply rules depending on ISAM groups but it is not working. I think IAG is not receiving iv-groups.
My config file is:
identity:
oidc:
discovery_endpoint: "<ISAM>"
client_id: "<client_ID>"
client_secret: "<client_secret>"
scopes:
- profile
- openid
mapped_identity: "{sub}"
id_token_attrs:
- "+sub"
Do I have to add anything?
Regards
------------------------------
Javier Garcia Pazos
------------------------------