website/docs: add source property mappings, rework provider property mappings (#10652)
This commit is contained in:
committed by
GitHub
parent
9343e3495a
commit
322ae4c4ed
@ -32,6 +32,20 @@ To try out the release candidate, replace your Docker image tag with the latest
|
||||
|
||||
**If you have any custom property mappings, we recommend migrating them to this new format.**
|
||||
|
||||
- **OAuth and SAML sources now sync groups by default**
|
||||
|
||||
OAuth (specifically OpenID and Okta) sources now sync groups by default when a `groups` claim is available.
|
||||
|
||||
SAML sources now sync groups by default when a `http://schemas.xmlsoap.org/claims/Group` attribute is available in the assertion.
|
||||
|
||||
To disable that behavior, create an OAuth/SAML source property mapping with the following expression:
|
||||
|
||||
```python
|
||||
return {
|
||||
"groups": [],
|
||||
}
|
||||
```
|
||||
|
||||
### Manual action may be required
|
||||
|
||||
- **Changes to the external user type**
|
||||
@ -50,6 +64,8 @@ To try out the release candidate, replace your Docker image tag with the latest
|
||||
|
||||
## New features
|
||||
|
||||
- **Source property mappings for SCIM, OAuth, SAML and Plex sources**
|
||||
|
||||
- **SAML Source encryption support**
|
||||
|
||||
It is now possible to configure a SAML Source to decrypt and validate encrypted assertions. This can be configured by certaing a [Certificate-keypair](../../core/certificates.md) and selecting it in the SAML Source.
|
||||
|
||||
Reference in New Issue
Block a user