-
Notifications
You must be signed in to change notification settings - Fork 168
Document ClaimActions configuration for dashboard OpenID Connect authentication #5192
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Document ClaimActions configuration for dashboard OpenID Connect authentication #5192
Conversation
Co-authored-by: JamesNK <[email protected]>
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Pull Request Overview
This PR documents the new ClaimActions configuration feature for the Aspire dashboard's OpenID Connect authentication. The documentation explains how users can map custom claims from their OpenID Connect identity provider's user info endpoint to the dashboard user's claims identity, which is particularly useful for role-based authentication scenarios.
Key changes include:
- Added comprehensive documentation for the
ClaimActionsconfiguration option - Created a detailed "Claim actions" subsection with property reference and examples
- Updated the documentation date to reflect the current changes
|
@IEvangelist Documentation for a vNext feature. Can you review and merge into the next major release branch. |
Description
This PR documents the new
ClaimActionsconfiguration feature for the Aspire dashboard's OpenID Connect authentication, introduced in dotnet/aspire#8396.The
ClaimActionsconfiguration allows users to map custom claims from their OpenID Connect identity provider's user info endpoint to the dashboard user's claims identity. This is particularly useful for scenarios requiring role-based authentication or mapping custom claims that aren't included by default.Changes
Dashboard:Frontend:OpenIdConnect:ClaimActionsconfiguration option to the Frontend authentication tableClaimType,JsonKey,SubKey,IsUnique,ValueType)SubKeyms.dateto reflect the documentation updateExample Usage
JSON Configuration
{ "Dashboard": { "Frontend": { "OpenIdConnect": { "ClaimActions": [ { "ClaimType": "role", "JsonKey": "role" } ] } } } }Environment Variables
Fixes the documentation request from dotnet/aspire#8396.
Original prompt
💡 You can make Copilot smarter by setting up custom instructions, customizing its development environment and configuring Model Context Protocol (MCP) servers. Learn more Copilot coding agent tips in the docs.
Internal previews