Added more details about property mapping

This commit is contained in:
Dewi Roberts
2025-05-09 13:47:24 +01:00
parent bbc98d55a7
commit 34aa2b7829

View File

@ -31,22 +31,22 @@ Ironclad requires a first and last name for each user. By default authentik only
1. Log in to authentik as an admin, and open the authentik Admin interface. 1. Log in to authentik as an admin, and open the authentik Admin interface.
2. Navigate to **Customization** > **Property Mappings** and click **Create**. 2. Navigate to **Customization** > **Property Mappings** and click **Create**.
- **Select type**: select **Scope Mapping** as the property mapping type. - **Select type**: select **Scope Mapping** as the property mapping type.
- **Configure the Scope Mapping**: Provide a descriptive name (e.g. `Ironclad Profile Scope`), and an optional description. - **Configure the Scope Mapping**: Provide a descriptive name (e.g. `Ironclad Profile Scope`), and an optional description.
- **Scope name**: `profile` - **Scope name**: `profile`
- **Expression**: - **Expression**:
```python showLineNumbers ```python showLineNumbers
return { return {
"name": request.user.name, "name": request.user.name,
"preferred_username": request.user.username, "preferred_username": request.user.username,
"nickname": request.user.username, "nickname": request.user.username,
"groups": [group.name for group in request.user.ak_groups.all()], "groups": [group.name for group in request.user.ak_groups.all()],
"last_name": request.user.name.rsplit(" ", 1)[-1], "last_name": request.user.name.rsplit(" ", 1)[-1],
"first_name": request.user.name.rsplit(" ", 1)[0], "first_name": request.user.name.rsplit(" ", 1)[0],
} }
``` ```
3. Click **Finish** to save the property mapping. 3. Click **Finish** to save the property mapping.
@ -58,9 +58,15 @@ Ironclad requires a first and last name for each user. By default authentik only
- **Application**: provide a descriptive name, an optional group for the type of application, the policy engine mode, and optional UI settings. - **Application**: provide a descriptive name, an optional group for the type of application, the policy engine mode, and optional UI settings.
- **Choose a Provider type**: select **SAML Provider** as the provider type. - **Choose a Provider type**: select **SAML Provider** as the provider type.
- **Configure the Provider**: provide a name (or accept the auto-provided name), the authorization flow to use for this provider, and the following required configurations. - **Configure the Provider**: provide a name (or accept the auto-provided name), the authorization flow to use for this provider, and the following required configurations.
- Temporarily set the **ACS URL** to `https://temp.temp` - Temporarily set the **ACS URL** to `https://temp.temp`
- Set the **Audience** to `https://ironcladapp.com` - Set the **Audience** to `https://ironcladapp.com`
- Under **Advanced protocol settings**, set an available signing certificate, and select - Under **Advanced protocol settings**:
- Set an available signing certificate.
- **Scopes**:
- Remove `authentik default OAuth Mapping: OpenID 'profile'` from **Selected Scopes**.
- Add the scope that you created in the previous section (e.g. `Ironclad Profile Scope`) to **Selected Scopes**.
- **Configure Bindings** _(optional)_: you can create a [binding](/docs/add-secure-apps/flows-stages/bindings/) (policy, group, or user) to manage the listing and access to applications on a user's **My applications** page. - **Configure Bindings** _(optional)_: you can create a [binding](/docs/add-secure-apps/flows-stages/bindings/) (policy, group, or user) to manage the listing and access to applications on a user's **My applications** page.
3. Click **Submit** to save the new application and provider. 3. Click **Submit** to save the new application and provider.