ory / kratos

The most scalable and customizable identity server on the market. Replace your Homegrown, Auth0, Okta, Firebase with better UX and DX. Has all the tablestakes: Passkeys, Social Sign In, Multi-Factor Auth, SMS, SAML, TOTP, and more. Written in Go, cloud native, headless, API-first. Available as a service on Ory Network and for self-hosters.
https://www.ory.sh/?utm_source=github&utm_medium=banner&utm_campaign=kratos
Apache License 2.0
11.21k stars 959 forks source link

Add admin API or control to support enabling new OIDC Providers for existing users in Kratos #4154

Closed VisheshBansal closed 1 week ago

VisheshBansal commented 1 week ago

Preflight checklist

Ory Network Project

No response

Describe your problem

In a self-hosted deployment of Ory Kratos used within a SaaS product, managing user authentication through OIDC (OpenID Connect) providers poses a significant challenge when introducing new providers after users have already registered or logged in using an existing one.


Scenario

Initial Setup

Change in Authentication Method


The Challenge

Lack of Administrative Control

User Dependency on Self-Service


Implications

Describe your ideal solution

Administrative API for OIDC Provider Management

Workarounds or alternatives

There is no alternative or workaround to do this at this point to my knowledge.

Version

1.3.0

Additional Context

No response

aeneasr commented 1 week ago

Thank you for creating this suggestion! Unfortunately, it is out of scope for this project to support an API for configuration. You can however use Ory Network to configure services via APIs if you want to, or build your own API to config file wrapper. Thank you for understanding!