You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: content/en/docs/appstore/use-content/platform-supported-content/modules/SAML/_index.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -460,7 +460,7 @@ You can set up custom user provisioning by selecting the **IdP Configuration** t
460
460
* By default, the value is set to *Name*.
461
461
* **Allow the module to create users** – This enables the module to create users based on user provisioning and attribute mapping configurations. When disabled, it will still update existing users. However, for new users, it will display an exception message stating that the login action was successful but no user has been configured.
462
462
* By default, the value is set to *Yes*.
463
-
* **User role** – the role which will be assigned to newly created users.
463
+
* **Default Userrole** – the role assigned to newly created users and remains unchanged even when the user's details are updated. You can select one default user role. To assign additional roles, use the Access Token Parsing Microflow. If the Access Token Processing Microflow is selected, OIDC verifies the updated default role configuration and applies any changes to the user's role. Note that, bulk updates for existing users are not automated when the default role configuration is changed.
464
464
* **User Type** – this allows you to configure end-users of your application as internal or external. It is created upon the creation of the user and updated each time the user logs in.
Copy file name to clipboardExpand all lines: content/en/docs/appstore/use-content/platform-supported-content/modules/oidc.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -536,8 +536,8 @@ You can set up custom user provisioning by setting the following constants. You
536
536
| PrincipalEntityAttribute | the attribute holding the unique identifier of an authenticated user ||`Name`|
537
537
| PrincipalIdPAttribute | the IdP claim which is the unique identifier of an authenticated user ||`sub`|
538
538
| AllowcreateUsers | allow to create users in the application |*optional*|`True`|
539
-
| Userrole | the role which will be assigned to newly created users |*optional* - Default Userrole is assigned only at user creation <br> - User updates do not change the default role <br> - No bulk update for existing users when the default userrole changes |`User`|
540
-
| UserType | assign usertype to the created users |*optional*|`Internal`|
539
+
| Userrole | the role which will be assigned to newly created users |*optional* - The Userrole is assigned only at user creation and remains unchanged even when the user's details are updated <br> - No bulk update for existing users when the default userrole changes |`User`|
540
+
| UserType | assign user type to the created users |*optional*|`Internal`|
541
541
| CustomUserProvisioning | a custom microflow to use for user provisioning |*optional* – in the form `modulename.microflowname` – the microflow name must begin with the string `UC_CustomProvisioning`|`Mymodule.UC_CustomProvisioning`|
542
542
543
543
#### Custom User Provisioning at Runtime{#custom-provisioning-rt}
@@ -557,7 +557,7 @@ You can set up custom user provisioning once your app is running using the `OIDC
557
557
***The attribute where the user principal is stored** – unique identifier associated with an authenticated user.
558
558
***Allow the module to create users** – this enables the module to create users based on user provisioning and attribute mapping configurations. When disabled, it will still update existing users. However, for new users, it will display an exception message stating that the login action was successful but no user has been configured.
559
559
* By default, the value is set to ***Yes***.
560
-
***User role** – the role which will be assigned to newly created users. You can select one default user role. If you need additional user roles, use Access Token Parsing microflow to assign multiple roles.
560
+
***Default Userrole** – the role assigned to newly created users and remains unchanged even when the user's details are updated. You can select one default user role. To assign additional roles, use the Access Token Parsing Microflow. If the Access Token Processing Microflow is selected, OIDC verifies the updated default role configuration and applies any changes to the user's role. Note that, bulk updates for existing users are not automated when the default role configuration is changed.
561
561
***User Type** – this allows you to configure end-users of your application as internal or external. It is created upon the creation of the user and updated each time the user logs in.
Copy file name to clipboardExpand all lines: content/en/docs/appstore/use-content/platform-supported-content/modules/scim.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -244,7 +244,7 @@ In the **Provisioning** tab of the SCIM server configuration, you need to config
244
244
***The attribute where the user principal is stored** (primary attribute): unique identifier associated with an authenticated user.
245
245
***Allow the module to create users**: this enables the module to create users based on user provisioning and attribute mapping configurations.
246
246
* By default, the value is set to ***Yes***.
247
-
***Default Userrole**: the role that will be assigned to newly created users by default.
247
+
***Default Userrole** – the role assigned to newly created users and remains unchanged even when the user's details are updated. You can select one default user role. To assign additional roles, use the Access Token Parsing Microflow. If the Access Token Processing Microflow is selected, OIDC verifies the updated default role configuration and applies any changes to the user's role. Note that, bulk updates for existing users are not automated when the default role configuration is changed.
248
248
***User Type**: this allows you to configure end-users of your application as internal or external. It is created when the user is created and updated whenever user details, such as name, email, or active status, are changed.
249
249
* By default, the value is set to ***Internal***.
250
250
***Attribute Mapping**: under **Attribute Mapping**, select an **IdP Attribute** (claim) for each piece of information you want to add to your custom user entity. Specify the **Configured Entity Attribute** where you want to store the information.
0 commit comments