Welcome to the WSO2 Identity Server source code! For info on working with the WSO2 Identity Server repository and contributing code, click the link below.
The current hint provided under "Validate linked local accounts" under "Linked Accounts" within the "User Attributes" tab in an application in the console lacks clarity regarding its purpose.
Users may not readily understand that this option needs to be selected to link the local user account created in scenarios such as federated logins through JIT provisioning.
The hint could be enhanced to clearly convey that enabling this option is necessary to link the local user account created during federated logins via JIT user provisioning.
How to reproduce
Create a new connection (google) and add JIT user provisioning.
Create a new standard based application and enable app native authentication API.
Configure the application by giving the redirect URL, allowed origins, and enable code grant type.
Use the API based authentication flow to login using the added federated login through the redirect url.
Call scim2/me endpoint by setting the authorization header using the access token.
Environment
IS 7.0
Additional context
Failure to select this option results in the linked account not being associated with the one created through JIT user provisioning. Consequently, users will encounter difficulties accessing "scim2/me" endpoints, leading to a 404 error.
Describe the issue
How to reproduce
Environment
Additional context