-
Notifications
You must be signed in to change notification settings - Fork 1k
feat: add SCIM provisioning via Okta #4132
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
This doesn't delete users, right? I wonder if people will want/expect that, but it gets a bit tricky because of workspaces...
if len(options.ScimAPIKey) != 0 { | ||
api.AGPL.RootHandler.Route("/scim/v2", func(r chi.Router) { | ||
r.Use(api.scimEnabledMW) | ||
r.Post("/Users", api.scimPostUser) |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Capital U
? :o
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Yeah this is the SCIM spec :(
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
craaaazy
Yeah, this is probably fine for now too. People mostly care about deprovisioning access. Deprovisioning resources can definitely be a follow up. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
We should add docs in this PR too.
https://coder.com/docs/coder-oss/latest/admin/auth you can add a section for SCIM. I'm sure @bpmct would help!
Co-authored-by: Ben Potter <ben@coder.com>
closes #3501 |
No description provided.