Skip to content

It doesnt allow to login to myaccount when multiattribute login is enabled and optional field claim set is kept empty #13282

@ShanikaWickramasinghe

Description

@ShanikaWickramasinghe

How to reproduce:

  1. Enable multiattribute login from resident identity provider
  2. Keep the attribute claim as http://wso2.org/claims/username in the Allowed Attribute Claim List
  3. Access myaccount and try to login as admin:admin
  4. It wont allow the admin user to login
  5. Come back for management console resident IDP > multi attribute login > enable multi attribute login and keep the claim set as empty ( as this is given as a optional field)
  6. Access my account try to login as admin:admin
    7.It wont allow the admin user to login
Untitled_.Mar.20.2022.2_35.PM.mp4

Expected Behavior

If the user is allowed to keep the claim set as empty even though multi attribute login is enabled (as claim set is a optional field) there is a chance for a user to try these negative flows. We need to handle these flows with proper restrictions for the user if that flow is not allowed.

Suggestion - We should improve here as if the multi attribute login is enabled then the claim set field needs to become a mandatory field
In console claim set is a mandatory field. Suggesting to do the same for the management console

Environment
IS 5.12.0 alpha 16
h2/default

Metadata

Metadata

Assignees

Type

No type

Projects

No projects

Relationships

None yet

Development

No branches or pull requests

Issue actions