Replies: 2 comments 5 replies
-
Maybe I misunderstand but those config variables should have the name of the remote group which should enable the superuser or staff privilege when the account is created in django and I'm not sure how it would work if there aren't remote groups being presented. Did you hack the source code to redefine these config variables as a list of userids to put in the staff and superuser group? If you don't have remote managed groups being presented by the webserver then you can just manually manage the groups, and the staff/superuser access, within the django admin portal or with a script that checks how the users are provisioned over the API and adds/removes the appropriate access, especially if you do have groups but they just aren't being presented by your authn system and you can query them in a script. |
Beta Was this translation helpful? Give feedback.
-
I see your point, so I took you approach but making a couple of changes; I moved user.save away from configure_group and shuffled the logic around. Moreover, in your snippet the two settings are mutually exclusive, that would be a breaking change with the previous behavior. So the end result could be something like this: Let me try to open an issue :) |
Beta Was this translation helpful? Give feedback.
Uh oh!
There was an error while loading. Please reload this page.
-
Hi, I activated GCP IaP jwt integration on my installation. I need to give some users SU/STAFF status, however jwt tokens does not provide any group or similar info, only email and ID. So, I used the REMOTE_AUTH_SUPERUSERS and REMOTE_AUTH_STAFF_USERS to achieve the result, but I had to hack the code because those two variables are applied only if REMOTE_AUTH_GROUP_SYNC_ENABLED is true. I don't see the reason to disregard REMOTE_AUTH_SUPERUSERS when remote auth does not provide group info, what I'm missing?
Beta Was this translation helpful? Give feedback.
All reactions