-
Notifications
You must be signed in to change notification settings - Fork 936
Closed
wso2-extensions/identity-governance
#580Labels
Affected-6.0.0Issues that get reported against 5.12.0 will get this labelIssues that get reported against 5.12.0 will get this labelMutli-Attribute-LoginIssues reported on feature Multi Attribute LoginIssues reported on feature Multi Attribute LoginPriority/HighestQA-ReportedIssues reported by a QAIssues reported by a QASeverity/CriticalType/Bug
Milestone
Description
How to reproduce:
- Enable multiattribute login from resident identity provider
- Keep the attribute claim as http://wso2.org/claims/username in the Allowed Attribute Claim List
- Access myaccount and try to login as admin:admin
- It wont allow the admin user to login
- Come back for management console resident IDP > multi attribute login > enable multi attribute login and keep the claim set as empty ( as this is given as a optional field)
- Access my account try to login as admin:admin
7.It wont allow the admin user to login
Untitled_.Mar.20.2022.2_35.PM.mp4
Expected Behavior
If the user is allowed to keep the claim set as empty even though multi attribute login is enabled (as claim set is a optional field) there is a chance for a user to try these negative flows. We need to handle these flows with proper restrictions for the user if that flow is not allowed.
Suggestion - We should improve here as if the multi attribute login is enabled then the claim set field needs to become a mandatory field
In console claim set is a mandatory field. Suggesting to do the same for the management console
Environment
IS 5.12.0 alpha 16
h2/default
Metadata
Metadata
Assignees
Labels
Affected-6.0.0Issues that get reported against 5.12.0 will get this labelIssues that get reported against 5.12.0 will get this labelMutli-Attribute-LoginIssues reported on feature Multi Attribute LoginIssues reported on feature Multi Attribute LoginPriority/HighestQA-ReportedIssues reported by a QAIssues reported by a QASeverity/CriticalType/Bug