Overview

The Authorization Customization feature provides flexible role management by allowing users to tailor how roles are defined and displayed. Roles are assigned through a scoped role string managed by an identity provider (IDP), and this feature introduces several customization options:

These enhancements enable organizations to align role management and display with their specific needs and identity provider configurations, facilitating more precise control over user access and role representation in the application.

Customizable Scoped Role Delimiter

The CDCM application allows the delimiter used in scoped role strings to be customized, providing flexibility in how roles are structured and integrated with various identity providers.

Customizable Wildcard

The CDCM application provides the ability to customize the wildcard used in scoped role strings, enhancing flexibility in defining access across multiple configuration areas.

This feature allows organizations to customize access patterns and streamline role management by using intuitive and relevant wildcard symbols that align with their identity provider and access control strategies.

Role Claim configuration

The CDCM application allows the usage of different claims in the token coming from the IDP. By doing this this the roles set in a specific claim are used for authorization in the CDCM application and different fields in that claim can be used for the display names. This enhances clarity and alignment with organizational naming conventions. It is also possible to specify a prefix that should be ignored when parsing the role claim string coming from the identity provider.

Email To Role Admin Mapping

CDCM can add the roleAdmin Role that is created during space creation to arbitrary users by adding their email address to a comma-separated list in the environment variable ROLE_ADMINS.

Example:

export ROLE_ADMINS="alice@example.com bob@example.com"

CDCM will add the roleAdmin role for all spaces the the users alice and bob that are mapped via the email addresses in the OIDC Token Response from the IAM system.