add claims scopes changelog (#1177)

pull/1150/head
Jim 5 years ago committed by GitHub
parent 05c68c1c55
commit 110a1ca30d
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23

@ -34,6 +34,28 @@ Canonical reference for changes, improvements, and bugfixes for Boundary.
### New and Improved
* cli/api/sdk: Add support to request additional OIDC claims scope values from
the OIDC provider when making an authentication request.
([PR](https://github.com/hashicorp/boundary/pull/1175)).
By default, Boundary only requests the "openid" claims scope value. Many
providers, like Okta and Auth0 for example, will not return the standard claims
of email and name when you request the default claims scope (openid).
Boundary uses the standard email and name claims to populated an OIDC
account's `Email` and `FullName` attributes. If you'd like these account
attributes populated, you'll need reference your OIDC provider's documentation
to learn which claims scopes are required to have these claims returned during
the authentication process.
Boundary now provides a new OIDC auth method parameter `claims_scopes` which
allows you to add multiple additional claims scope values to an OIDC auth
method configuration.
For information on claims scope values see: [Scope Claims in the OIDC
specification](https://openid.net/specs/openid-connect-core-1_0.html#ScopeClaims)
* cli: Match JSON format output with the across-the-wire API JSON format
([PR](https://github.com/hashicorp/boundary/pull/1155))
* api: Return `204` instead of an empty object on successful `delete` operations
@ -50,6 +72,7 @@ Canonical reference for changes, improvements, and bugfixes for Boundary.
* Login Name
* Full Name
* Email
These new user attributes correspond to attributes from the user's primary
auth method account. These attributes will be empty when the user has no
account in the primary auth method for their scope, or there is no designated

Loading…
Cancel
Save