docs: add v2.6.0 features - GitHub App auth, OIDC algorithms, and UserInfo claims#386
Conversation
…rInfo claims - Add GitHub App credential type documentation for storage backends - Add OIDC `algorithms` config for customizing accepted token signing algorithms - Add OIDC `fetch_extra_user_info` config for merging UserInfo endpoint claims - Update configuration overview reference tables with new properties - Break up credentials reference table into per-type subsections - Add visual verification instructions to AGENTS.md Signed-off-by: Mark Phelps <209477+markphelps@users.noreply.github.com>
Pull Request ReviewI've reviewed PR #386 and found the documentation changes to be well-structured and comprehensive. Here's my detailed feedback: ✅ Strengths
💡 Suggestions for Improvement1. Minor Consistency Issue in Default ValuesIn If not specified, the default is ["RS256"].In Consider using consistent formatting - either both should use code formatting or both should be plain text. I recommend code formatting for both: 2. GitHub App Security BenefitsThe GitHub App section in
Consider adding a similar note in the credentials section of 3. Algorithm List FormattingThe list of supported algorithms (line 298 in Current: Suggested: This groups them by algorithm family, making it clearer for users who may not be familiar with JWT signing algorithms. 4. UserInfo Endpoint Use CaseThe <Tip>
This is especially useful with Azure AD, which often omits group claims from
ID tokens and requires calling the UserInfo endpoint to retrieve them.
</Tip>🔍 Quality Checks
📝 SummaryThis is a high-quality documentation PR that accurately reflects the new features in v2.6.0. The changes are well-organized, clearly written, and follow the project's documentation standards. The suggestions above are minor enhancements that would further improve clarity, but they are not blockers for merging. Recommendation: ✅ Approve with minor suggestions The PR is ready to merge as-is, though incorporating the suggestions would provide additional value to users. Review conducted using Claude Code with analysis of documentation structure, style guidelines compliance, and technical accuracy. |
Summary
algorithmsprovider config for customizing accepted ID token signing algorithms (feat(oidc): support configurable token signing algorithms flipt#5362)fetch_extra_user_infoprovider config for merging UserInfo endpoint claims into auth sessions (feat(oidc): optionally merge userinfo claims into auth session flipt#5364)