-
Notifications
You must be signed in to change notification settings - Fork 1.4k
Open
Description
Problem:
Currently, there is no way to automatically assign Kutt admin privileges to users based on a group or role claim from an OIDC (OpenID Connect) identity provider (such as Azure Entra ID, Auth0, Keycloak, etc). Admin status can only be set locally, and OIDC login only matches the email claim. As a result, organizations cannot leverage IdP group or app role assignment for admin user management.
Proposed Solution:
- Add configuration options (e.g.,
OIDC_ADMIN_GROUPand/orOIDC_ROLE_CLAIM) that allow Kutt to assign the admin role to users who present a specific group or role claim via OIDC during login. - Administrator group/role assignment should be checked both for new users (on first login) and on every authentication (to allow removing admin if the group/role is removed in the IdP).
Expected Usage Scenario:
- IdP (e.g. Azure Entra) issues claim
rolesorgroups. - If the configured value is present in that claim, the user is marked as admin.
Benefit:
- Enable unified identity management and automated admin assignment using standard IdP features.
- Reduce manual effort, increase security, and support enterprise integration.
References:
- OIDC standard claims
- Azure Entra roles
- Source code: server/passport.js
Reactions are currently unavailable
Metadata
Metadata
Assignees
Labels
No labels