🚀 Feature: Force scopes #160

Closed
opened 2025-10-07 23:55:42 +03:00 by OVERLORD · 2 comments
Owner

Originally created by @pkondratev on GitHub.

Feature description

Hello! Thank you so much for the work you've done—the project is fantastic! A big request: could you add a feature allowing clients to forcibly pass certain scopes, even if the client didn't request them?

Pitch

The issue is that the 'groups' scope is only passed when the client requests it, but, for example, OpenGist doesn't request this scope, even though it relies on it if the user is an admin in some groups.

Originally created by @pkondratev on GitHub. ### Feature description Hello! Thank you so much for the work you've done—the project is fantastic! A big request: could you add a feature allowing clients to forcibly pass certain scopes, even if the client didn't request them? ### Pitch The issue is that the 'groups' scope is only passed when the client requests it, but, for example, OpenGist doesn't request this scope, even though it relies on it if the user is an admin in some groups.
OVERLORD added the feature label 2025-10-07 23:55:42 +03:00
Author
Owner

@stonith404 commented on GitHub:

Yes, I agree with @kmendell. OIDC clients should request the scopes that they need.

I'm not using OpenGist but after a quick search it seems like they don't support customizing the claims yet but there is an open feature request https://github.com/thomiceli/opengist/issues/460. Feel free to upvote the issue there.

@stonith404 commented on GitHub: Yes, I agree with @kmendell. OIDC clients [should request the scopes that they need](https://openid.net/specs/openid-connect-core-1_0.html#ScopeClaims). I'm not using OpenGist but after a quick search it seems like they don't support customizing the claims yet but there is an open feature request https://github.com/thomiceli/opengist/issues/460. Feel free to upvote the issue there.
Author
Owner

@kmendell commented on GitHub:

This is something the client should request based on my knowledge. Based on the documentation: https://opengist.io/docs/configuration/oauth-providers.html#openid-connect. The two following config options should be used:

oidc.group-claim-name: groups        # Name of the claim containing the groups
oidc.admin-group: admin-group-name   # Name of the group that should receive admin rights
@kmendell commented on GitHub: This is something the client should request based on my knowledge. Based on the documentation: https://opengist.io/docs/configuration/oauth-providers.html#openid-connect. The two following config options should be used: ``` oidc.group-claim-name: groups # Name of the claim containing the groups oidc.admin-group: admin-group-name # Name of the group that should receive admin rights ```
Sign in to join this conversation.
1 Participants
Notifications
Due Date
No due date set.
Dependencies

No dependencies set.

Reference: starred/pocket-id-pocket-id-1#160