-
Notifications
You must be signed in to change notification settings - Fork 72
Description
We have a customer that is considering an OIDC Provider that have a custom claim consisting of a list of json objects. The custom claim lives in the access token. The immediate solution we think will work is to let the applications themself read the SHINYPROXY_OIDC_ACCESS_TOKEN environment variable and manage how to act on the custom claim. The drawback is that all applications will be available on the landing page in ShinyProxy since the only data that indicate what applications an authenticated user have access to exists in the access token in the form of json objects. We'll need to trust the applications to manage access to data instead letting ShinyProxy control access, which can be both good and bad in this case.
Do you have suggestions on how to:
- Access the information in an access token and use it for role-claim or access expression to limit the available applications on the landing page.
- Parse the list in the custom claim in an another way than full string match, for instance using json or regex.
I recon a native solution might require introduction of a new authentication object, as far as I can tell oidcUser is based off DefaultOidcUser. And we're a bit unsure if clients should read access tokens in the first place.