Comments (1)
Hi @AllaeddineEL,
a seperate resource would be nice, but did you notice that you can use the keycloak_generic_client_protocol_mapper to map a Group list attribute?
For example:
resource "keycloak_generic_client_protocol_mapper" "group_list" {
realm_id = var.realm_id
client_id = "${keycloak_saml_client.client.id}"
name = "Group list" # Name
protocol = "saml" # Protocol
protocol_mapper = "saml-group-membership-mapper" # Mapper Type
config = {
"single" = "true"
"attribute.nameformat" = "Basic"
"full.path" = "false"
"friendly.name" = "Group List"
"attribute.name" = "groupList"
}
The attribute details you can get by a 'Get mapper by id' REST-Call on a existing mapper in your client.
GET /{realm}/clients/{id}/protocol-mappers/models/{id}
The output is a json with all the details you need for the keycloak_generic_client_protocol_mapper resource . For example:
{
"id": "xxx-xx-xxx-xx-xxx",
"name": "Group list",
"protocol": "saml",
"protocolMapper": "saml-group-membership-mapper",
"consentRequired": false,
"config": {
"single": "true",
"attribute.nameformat": "Basic",
"full.path": "false",
"friendly.name": "Group List",
"attribute.name": "groupList"
}
}
from terraform-provider-keycloak.
Related Issues (20)
- Unable to add realm client roles to new client as a composite HOT 1
- Changes to `custom_identity_provider_mapper` ignored when updating roles or groups HOT 1
- Possibility to change authentication registration recaptcha to REQUIRED and activate Recaptcha config
- Consistency: keycloak_openid_client_service_account_role for both realm and client roles
- Import `keycloak_authentication_flow` gives "Could not find flow with id" HOT 1
- Federation not working when created together with realm
- Data source: keycloak_roles
- Data source: keycloak_openid_client_client_policy
- Missing Field display_on_consent_screen: Inability to Toggle Off Display Content Screen When Consent Text is Void/Null
- Add endpoint discovery to realm
- Provider crash when adding keycloak_default_roles on new realm HOT 2
- Support for 'add_to_access_token_response' for OIDC User Session Notes HOT 1
- If possible, add warning to documentation for keycloak_user resource for possible GDPR issues
- Implement a data source to retrieve all realms
- Add support for `Exclude Issuer From Authentication Response` in `OpenID Connect Compatibility Modes`
- Setting clients default roles using keycloak_default_roles gives error HOT 1
- Realm otp_policy does not support setting 'Reusable token'
- resource "keycloak_default_roles" doesn't support adding client roles HOT 2
- Add connection pooling support for keycloak_ldap_user_federation
- Importing clients / roles does not update realm_id correctly HOT 1
Recommend Projects
-
React
A declarative, efficient, and flexible JavaScript library for building user interfaces.
-
Vue.js
🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.
-
Typescript
TypeScript is a superset of JavaScript that compiles to clean JavaScript output.
-
TensorFlow
An Open Source Machine Learning Framework for Everyone
-
Django
The Web framework for perfectionists with deadlines.
-
Laravel
A PHP framework for web artisans
-
D3
Bring data to life with SVG, Canvas and HTML. 📊📈🎉
-
Recommend Topics
-
javascript
JavaScript (JS) is a lightweight interpreted programming language with first-class functions.
-
web
Some thing interesting about web. New door for the world.
-
server
A server is a program made to process requests and deliver data to clients.
-
Machine learning
Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.
-
Visualization
Some thing interesting about visualization, use data art
-
Game
Some thing interesting about game, make everyone happy.
Recommend Org
-
Facebook
We are working to build community through open source technology. NB: members must have two-factor auth.
-
Microsoft
Open source projects and samples from Microsoft.
-
Google
Google ❤️ Open Source for everyone.
-
Alibaba
Alibaba Open Source for everyone
-
D3
Data-Driven Documents codes.
-
Tencent
China tencent open source team.
from terraform-provider-keycloak.