Closed greenpau closed 4 years ago
Try
allow groups.0 AzureAD_Administrator
Try
allow groups.0 AzureAD_Administrator
@BTBurke, thank you, but it did not work 👍 I will continue troubleshooting.
What if AzureAD_Administrator
is 2nd element? What is your vision to accomplish the matching according to group membership?
allow groups.0 AzureAD_Administrator
@BTBurke , the above does not work because the evaluations below, i.e. vClaims
only contains groups
.
// If token contains rules with allow or deny, evaluate
if len(p.AccessRules) > 0 {
var isAuthorized []bool
for _, rule := range p.AccessRules {
v := vClaims[rule.Claim]
There is actually a login to check whether something is a slice (array) and match on it. In theory, the allow groups AzureAD_Administrator
should be working.
To be continued...
The allow groups AzureAD_Administrator
works. It was not working because of browser cache.
Great. I thought it should have worked. Cheers.
JWT token has the following claims:
What is the way to allow access to a page for anyone in
AzureAD_Administrator
group?