Adding support for a generic authenticated user role, irresepctive of jwt-role-claim #3366
-
I am currently using a managed PostgreSQL instance that doesn't allow me to provision additional roles but provides me with a role to use that was setup via their automated provisioning process. I am also using an OIDC provider that does not allow me to customize the claims that are provided in the id_token jwt and currently there is no claim in the token that matches the name of the role provisioned in postgres. Per the documentation if the jwt doesn't have a role claim (or another claim that matches the In this scenario postgrest was able to use the I would like to give users who don't have a role claim but do have a valid unexpired id_token access to postgrest without having to grant access to anonymous users. Right now postgrest treat's users who have a valid unexpired id_token as just as unauthenticated as someone completely anonymous and I would like to treat user's in that category differently. The idea would be to have something like a Is this something that the team would be open to receiving as a pull request or would there be a better way to handle this situation given that I don't control either postgres or the OIDC providers? Ps, if this is something that would be better posted elsewhere please let me know. |
Beta Was this translation helpful? Give feedback.
Replies: 1 comment 1 reply
-
This is better off created as an issue. |
Beta Was this translation helpful? Give feedback.
See #3367