Skip to content

Commit 9e5cab4

Browse files
Merge pull request mendix#8956 from mendix/kv-TW-2365
Update User Type
2 parents 8da879a + eb43822 commit 9e5cab4

File tree

3 files changed

+6
-5
lines changed

3 files changed

+6
-5
lines changed

content/en/docs/appstore/use-content/platform-supported-content/modules/SAML/_index.md

Lines changed: 4 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -461,8 +461,9 @@ You can set up custom user provisioning by selecting the **IdP Configuration** t
461461
* **Allow the module to create users** – This enables the module to create users based on user provisioning and attribute mapping configurations. When disabled, it will still update existing users. However, for new users, it will display an exception message stating that the login action was successful but no user has been configured.
462462
* By default, the value is set to *Yes*.
463463
* **User role** – the role which will be assigned to newly created users.
464-
* **User Type** – this allows you to configure end-users of your application as internal or external.
465-
* By default, the value is set to *Internal*.
464+
* **User Type** – this allows you to configure end-users of your application as internal or external. It is created upon the creation of the user and updated each time the user logs in.
465+
* By default, the value is set to *Internal*.
466+
466467
2. Under **Attribute Mapping**, for each piece of information you want to add to your custom user entity, select an **IdP Attribute** (claim) and specify the **Configured Entity Attribute** where you want to store the information.
467468
468469
Note the following:
@@ -471,7 +472,7 @@ You can set up custom user provisioning by selecting the **IdP Configuration** t
471472
* You can map multiple **IdP Attribute** (claims) to a **Configured Entity Attribute** but you cannot map a new **IdP Attribute** to a **Configured Entity Attribute** if it is already mapped.
472473
* The IdP Attribute is one of the fixed claims supported by the [OIDC SSO](/appstore/modules/oidc/) module.
473474
* **IdP Attributes**(Claims) cannot be of type enum, autonumber, or an association.
474-
475+
475476
3. In the **Custom UserProvisioning**, select a microflow you want to run for [Custom User Provisioning Using a Microflow](#custom-provisioning-mf). The custom microflow name must begin with the string `UC_CustomProvisioning`. If you have added a new microflow, you will need to refresh the module containing your microflow as described in [Installing Mx Model Reflection](/appstore/modules/model-reflection/). This selection can be blank if you do not want to add custom logic.
476477
4. Click **Save** to save the configuration.
477478

content/en/docs/appstore/use-content/platform-supported-content/modules/oidc.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -558,7 +558,7 @@ You can set up custom user provisioning once your app is running using the `OIDC
558558
* **Allow the module to create users** – this enables the module to create users based on user provisioning and attribute mapping configurations. When disabled, it will still update existing users. However, for new users, it will display an exception message stating that the login action was successful but no user has been configured.
559559
* By default, the value is set to ***Yes***.
560560
* **User role** – the role which will be assigned to newly created users. You can select one default user role. If you need additional user roles, use Access Token Parsing microflow to assign multiple roles.
561-
* **User Type** – this allows you to configure end-users of your application as internal or external.
561+
* **User Type** – this allows you to configure end-users of your application as internal or external. It is created upon the creation of the user and updated each time the user logs in.
562562
* By default, the value is set to ***Internal***.
563563

564564
5. Under **Attribute Mapping**, for each piece of information you want to add to your custom user entity, select an **IdP Attribute** (claim) and specify the **Configured Entity Attribute** where you want to store the information.

content/en/docs/appstore/use-content/platform-supported-content/modules/scim.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -245,7 +245,7 @@ In the **Provisioning** tab of the SCIM server configuration, you need to config
245245
* **Allow the module to create users**: this enables the module to create users based on user provisioning and attribute mapping configurations.
246246
* By default, the value is set to ***Yes***.
247247
* **Default Userrole**: the role that will be assigned to newly created users by default.
248-
* **User Type**: this allows you to configure end-users of your application as internal or external.
248+
* **User Type**: this allows you to configure end-users of your application as internal or external. It is created when the user is created and updated whenever user details, such as name, email, or active status, are changed.
249249
* By default, the value is set to ***Internal***.
250250
* **Attribute Mapping**: under **Attribute Mapping**, select an **IdP Attribute** (claim) for each piece of information you want to add to your custom user entity. Specify the **Configured Entity Attribute** where you want to store the information.
251251

0 commit comments

Comments
 (0)