Bug 1480005
Summary: | Allow groups to be associated with IDPs | ||
---|---|---|---|
Product: | [Community] Bugzilla | Reporter: | Jeff Fearn 🐞 <jfearn> |
Component: | Extensions | Assignee: | Jeff Fearn 🐞 <jfearn> |
Extensions sub component: | SAML2Auth | QA Contact: | tools-bugs <tools-bugs> |
Status: | CLOSED NEXTRELEASE | Docs Contact: | |
Severity: | unspecified | ||
Priority: | unspecified | ||
Version: | 5.0 | ||
Target Milestone: | 5.0 | ||
Target Release: | --- | ||
Hardware: | Unspecified | ||
OS: | Unspecified | ||
Whiteboard: | |||
Fixed In Version: | 5.0.3.rh34 | Doc Type: | If docs needed, set a value |
Doc Text: | Story Points: | --- | |
Clone Of: | Environment: | ||
Last Closed: | 2017-11-20 04:12:13 UTC | Type: | Bug |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: |
Description
Jeff Fearn 🐞
2017-08-09 22:12:02 UTC
Psst future me, don't forget to amend the IDP configuration script to remove the regex limitation from the external IDP. Working as expected and admin group is banned from customer IDP by default. This bug has been fixed and is now deployed on the beta site. https://beta-bugzilla.redhat.com/ |