Skip to content

Commit 8c3ebdf

Browse files
Merge pull request mendix#8960 from mendix/kv-TW-2364
Userrole info
2 parents 9e5cab4 + 59672d5 commit 8c3ebdf

File tree

3 files changed

+5
-5
lines changed

3 files changed

+5
-5
lines changed

content/en/docs/appstore/use-content/platform-supported-content/modules/SAML/_index.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -460,7 +460,7 @@ You can set up custom user provisioning by selecting the **IdP Configuration** t
460460
* By default, the value is set to *Name*.
461461
* **Allow the module to create users** – This enables the module to create users based on user provisioning and attribute mapping configurations. When disabled, it will still update existing users. However, for new users, it will display an exception message stating that the login action was successful but no user has been configured.
462462
* By default, the value is set to *Yes*.
463-
* **User role** – the role which will be assigned to newly created users.
463+
* **Default Userrole** – the role assigned to newly created users and remains unchanged even when the user's details are updated. You can select one default user role. To assign additional roles, use the Access Token Parsing Microflow. If the Access Token Processing Microflow is selected, OIDC verifies the updated default role configuration and applies any changes to the user's role. Note that, bulk updates for existing users are not automated when the default role configuration is changed.
464464
* **User Type** – this allows you to configure end-users of your application as internal or external. It is created upon the creation of the user and updated each time the user logs in.
465465
* By default, the value is set to *Internal*.
466466

content/en/docs/appstore/use-content/platform-supported-content/modules/oidc.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -536,8 +536,8 @@ You can set up custom user provisioning by setting the following constants. You
536536
| PrincipalEntityAttribute | the attribute holding the unique identifier of an authenticated user | | `Name` |
537537
| PrincipalIdPAttribute | the IdP claim which is the unique identifier of an authenticated user | | `sub` |
538538
| AllowcreateUsers | allow to create users in the application | *optional* | `True` |
539-
| Userrole | the role which will be assigned to newly created users | *optional* - Default Userrole is assigned only at user creation <br> - User updates do not change the default role <br> - No bulk update for existing users when the default userrole changes | `User` |
540-
| UserType | assign usertype to the created users | *optional* | `Internal` |
539+
| Userrole | the role which will be assigned to newly created users | *optional* - The Userrole is assigned only at user creation and remains unchanged even when the user's details are updated <br> - No bulk update for existing users when the default userrole changes | `User` |
540+
| UserType | assign user type to the created users | *optional* | `Internal` |
541541
| CustomUserProvisioning | a custom microflow to use for user provisioning | *optional* – in the form `modulename.microflowname` – the microflow name must begin with the string `UC_CustomProvisioning` | `Mymodule.UC_CustomProvisioning` |
542542

543543
#### Custom User Provisioning at Runtime{#custom-provisioning-rt}
@@ -557,7 +557,7 @@ You can set up custom user provisioning once your app is running using the `OIDC
557557
* **The attribute where the user principal is stored** – unique identifier associated with an authenticated user.
558558
* **Allow the module to create users** – this enables the module to create users based on user provisioning and attribute mapping configurations. When disabled, it will still update existing users. However, for new users, it will display an exception message stating that the login action was successful but no user has been configured.
559559
* By default, the value is set to ***Yes***.
560-
* **User role** – the role which will be assigned to newly created users. You can select one default user role. If you need additional user roles, use Access Token Parsing microflow to assign multiple roles.
560+
* **Default Userrole** – the role assigned to newly created users and remains unchanged even when the user's details are updated. You can select one default user role. To assign additional roles, use the Access Token Parsing Microflow. If the Access Token Processing Microflow is selected, OIDC verifies the updated default role configuration and applies any changes to the user's role. Note that, bulk updates for existing users are not automated when the default role configuration is changed.
561561
* **User Type** – this allows you to configure end-users of your application as internal or external. It is created upon the creation of the user and updated each time the user logs in.
562562
* By default, the value is set to ***Internal***.
563563

content/en/docs/appstore/use-content/platform-supported-content/modules/scim.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -244,7 +244,7 @@ In the **Provisioning** tab of the SCIM server configuration, you need to config
244244
* **The attribute where the user principal is stored** (primary attribute): unique identifier associated with an authenticated user.
245245
* **Allow the module to create users**: this enables the module to create users based on user provisioning and attribute mapping configurations.
246246
* By default, the value is set to ***Yes***.
247-
* **Default Userrole**: the role that will be assigned to newly created users by default.
247+
* **Default Userrole**the role assigned to newly created users and remains unchanged even when the user's details are updated. You can select one default user role. To assign additional roles, use the Access Token Parsing Microflow. If the Access Token Processing Microflow is selected, OIDC verifies the updated default role configuration and applies any changes to the user's role. Note that, bulk updates for existing users are not automated when the default role configuration is changed.
248248
* **User Type**: this allows you to configure end-users of your application as internal or external. It is created when the user is created and updated whenever user details, such as name, email, or active status, are changed.
249249
* By default, the value is set to ***Internal***.
250250
* **Attribute Mapping**: under **Attribute Mapping**, select an **IdP Attribute** (claim) for each piece of information you want to add to your custom user entity. Specify the **Configured Entity Attribute** where you want to store the information.

0 commit comments

Comments
 (0)