Goal is to help testing code for the SSO PR. Based on Timshel/sso-support
Tagged version are based on Vaultwarden releases, Ex: 1.31.0-1
is the first release based on Vaultwarden 1.31.0
.
\
See changelog for more details.
This branch now contain features not added to the SSO PR since it would slow even more it's review.
Allow to map roles from the Access token to users to grant access to VaultWarden
admin
console.
Support two roles: admin
or user
.
This feature is controlled by the following conf:
SSO_ROLES_ENABLED
: control if the mapping is done, default is false
SSO_ROLES_DEFAULT_TO_USER
: do not block login in case of missing or invalid roles, default is true
.SSO_ROLES_TOKEN_PATH=/resource_access/${SSO_CLIENT_ID}/roles
: path to read roles in the Access tokenAllow to invite user to existing Oganization if they are listed in the Access token. If activated it will check if the token contain a list of potential Orgnaization. If an Oganization with a matching name (case sensitive) is found it will the start the invitation process for this user. It will use the email associated with the Organization to send further notifications (admin side).
The flow look like this:
/groups
).SSO_ORGANIZATIONS_ID_MAPPING
is defined).email
associated with the Organization that a new user is ready to joinOne of the bonus of invitation is that if an organization define a specific password policy then it will apply to new user when they set their new master password.
If a user is part of two organizations then it will order them using the role of the user (Owner
, Admin
, User
or Manager
for now manager is last :() and return the password policy of the first one.
This feature is controlled with the following conf:
SSO_SCOPES
: Optional scope override if additionnal scopes are needed, default is "email profile"
SSO_ORGANIZATIONS_INVITE
: control if the mapping is done, default is false
SSO_ORGANIZATIONS_TOKEN_PATH
: path to read groups/organization in the Access token, default is /groups
SSO_ORGANIZATIONS_ID_MAPPING
: Optional, allow to map provider group to a Vaultwarden organization uuid
(default ""
, format: "ProviderId:VaultwardenId;"
)Made a version which additionnaly allow to run the server without storing the master password (it's still required just not sent to the server). It´s experimental, more information in timshel/experimental.
Change the docker files to package both front-end from Timshel/oidc_web_builds.
\
By default it will use the release which only make the sso
button visible.
If you want to use the version with the additional features mentionned, default redirection to /sso
and fix organization invitation.
You need to pass an env variable: -e SSO_FRONTEND='override'
(cf start.sh).
Docker images available at:
By default front-end version is fixed to prevent regression (check CHANGELOG.md).
\
When building the docker image it can be overrided by passing the OIDC_WEB_RELEASE
arg.
\
Ex to build with latest: --build-arg OIDC_WEB_RELEASE="https://github.com/Timshel/oidc_web_builds/releases/latest/download"
ATM The migrations add two tables sso_nonce
, sso_users
and a column invited_by_email
to users_organizations
.
Reverting to the default VW DB state can easily be done manually (Make a backup :) :
>BEGIN;
BEGIN
>DELETE FROM __diesel_schema_migrations WHERE version in ('20230910133000', '20230914133000', '20240214170000', '20240226170000', '20240306170000', '20240313170000');
DELETE 5
>DROP TABLE sso_nonce;
DROP TABLE
>DROP TABLE sso_users;
DROP TABLE
>ALTER TABLE users_organizations DROP COLUMN invited_by_email;
ALTER TABLE
> COMMIT / ROLLBACK;