-
Notifications
You must be signed in to change notification settings - Fork 144
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Authorization valve and tenant context valve improvements for support B2B use cases #242
Authorization valve and tenant context valve improvements for support B2B use cases #242
Conversation
b5394fb
to
aa26c66
Compare
aa26c66
to
b39db5a
Compare
...rbon.identity.authz.valve/src/main/java/org/wso2/carbon/identity/authz/valve/util/Utils.java
Show resolved
Hide resolved
9be3cea
to
e4dc253
Compare
PR builder started |
PR builder completed |
bf2043a
to
3e9aff5
Compare
3e9aff5
to
c71a43a
Compare
PR builder started |
PR builder completed |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Approving the pull request based on the successful pr build https://github.com/wso2/product-is/actions/runs/6542360509
Proposed changes in this pull request
As for now, authorization valve validate whether the authenticated user's tenant domain is same as the accessed tenant qualified resource path. If the request is organization qualified, it will be convert to tenant domain to do the mentioned comparison.
With this effort, the tenant qualified URLs and organization qualified URLs are treated separately.
1 - For tenant qualified paths, the previous logic is preserved.
2 - For organization qualified paths, the organization qualified path and the organization where the token is bound should be same. In order to keep the backward compatibility for organization qualified path (there can be tokens without organization bounded tokens to access organization qualified resources), the previous logic [1] is preserved.
[1] - https://github.com/wso2-extensions/identity-carbon-auth-rest/pull/242/files#diff-5c23026718f023a28a31deb8b3b2d38a1d587c41866b829b28ba63c9a72dc91cR104
Also, the organization bound tokens are allowed to be invoked with the root tenant path. When accessing a resources via root tenant URL path with an organization bound token, an organization scoped tenant flow is started to access only the organization scoped resources.
Related Issues.
When should this PR be merged
Depends on