Skip to content
New issue

Have a question about this project? # for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “#”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? # to your account

Automatically create a teleport user when using OIDC #624

Closed
tehsis opened this issue Nov 30, 2016 · 5 comments
Closed

Automatically create a teleport user when using OIDC #624

tehsis opened this issue Nov 30, 2016 · 5 comments

Comments

@tehsis
Copy link
Contributor

tehsis commented Nov 30, 2016

It would be nice if you are not forced to create a Teleport user when using OIDC.
i.e. If the provider verifies the user correctly, then you should be able to log into Teleport.

This way you can manage users completely from the provider without having to re-create each provider user in Teleport.

My first attempt to accomplish this is to create the user in Teleport if it's not found using a new configuration field on OIDC configuration (allowed_login).
An user created in this way should not need a password nor a Google Authenticator token.

master...tehsis:odic-automatic-user-creation

thoughts?

@klizhentas
Copy link
Contributor

I think we are going to address this problem in the context of #620 - check out it's comments for details on how are we going to provide mapping from OIDC claims to Teleport roles.

In some cases there's no need to have a local user entry, and I think your use case is very similar. Let me know if the proposed design doc fits your use-case.

@tehsis
Copy link
Contributor Author

tehsis commented Nov 30, 2016

It certainly does.
I think that not having to maintain an user on Teleport when using OIDC is a must.

Is there some estimate for this task? Are you already working on it? Is there some WIP I can take a look on? Thanks!

@jeremyd
Copy link
Contributor

jeremyd commented Nov 30, 2016

+1 wish I had this.. Not sure how to use SSO and not have to create a bunch of one-time google authenticator authentications...

@klizhentas
Copy link
Contributor

@jeremyd #620 should solve your problem then

@kontsevoy
Copy link
Contributor

Closing this because it's a part of the ongoing RBAC work.

hatched pushed a commit to hatched/teleport-merge that referenced this issue Nov 30, 2022
hatched pushed a commit that referenced this issue Dec 20, 2022
# for free to join this conversation on GitHub. Already have an account? # to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

4 participants