-
Notifications
You must be signed in to change notification settings - Fork 367
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
AzureAD: use AD OID as username to ensure unicity #224
AzureAD: use AD OID as username to ensure unicity #224
Conversation
…for local unix compatibility
Hello, could it be possible to provide a function to extract the name from the decoded JWT ? |
I agree the
This has similar risks as the current
|
I would rather leave this choice to the user/configuration. |
@thomas-rabiller-azimut, are you still working on this PR? I'd really like to see it merged. |
@jfleury-eidos The PR is complete as it is as far as I am concerned (fix is as I expect and tests have passed) but I am not sure what needs to be done for the jupyter Hub team to review and integrate it in the official repo... |
@sdementen asked that the username value be configurable. |
Using the I understand the documented warnings around Also, a nice configurable escape hatch might be an option such as I'm glad this is being looked at! I'm currently having to patch |
We are facing the same issues. An interesting note to add to the discussion: The problem seems indeed to be that v2.0 tokens don't have an email field. The example says that preferred_name can be an email address, but it is mutable. I agree that giving an option would be the best way to fix this. |
This PR requires admin review for compliance with project architecture and potential further testing
Background
This fix is a suggestion to solve issue #213 concerning Azure AD authentication.
Changed
OID
from AD as JupyterHub username instead ofname
property as it is today because thename
value is not immutable