Replies: 1 comment 3 replies
-
|
The |
Beta Was this translation helpful? Give feedback.
3 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Uh oh!
There was an error while loading. Please reload this page.
Uh oh!
There was an error while loading. Please reload this page.
-
MSDN page about Entra discourages its users from using most claims to uniquely identify users (https://learn.microsoft.com/en-us/entra/identity-platform/id-token-claims-reference).
For
preferred_usernameclaim (forwarded by Dex) it says: "... this value can't be used to make authorization decisions."For
emailclaim (also forwarded by Dex) it says: "... Never use it for authorization or to save data for a user."Yet, it so happens, that I want some piece of info that will allow me to do authorization decisions and to be able to save data for a user on the application side.
The only claim which appears to be suitable for such role seems to be the
oid, or possibly,oid+tid. These are supposed to uniquely identify a user. Yet, they are not forwarded by Dex even though I explicitly request theprofilescope.Am I missing something here? Which identifier should I use to uniquely identify an user on the application side? And if it's indeed an
oid, why Dex is swallowing it somewhere?Beta Was this translation helpful? Give feedback.
All reactions