forked from TrueCloudLab/certificates
Revert using preferred_username
It might present a security issue if the users can change this value for themselves. Needs further investigation
This commit is contained in:
parent
e5b206c1de
commit
bb1e051b27
1 changed files with 2 additions and 1 deletions
|
@ -389,7 +389,8 @@ func (o *OIDC) AuthorizeSSHSign(ctx context.Context, token string) ([]SignOption
|
|||
|
||||
// Get the identity using either the default identityFunc or one injected
|
||||
// externally. Note that the PreferredUsername might be empty.
|
||||
iden, err := o.getIdentityFunc(ctx, o, claims.Email, claims.PreferredUsername)
|
||||
// TBD: Would preferred_username present a safety issue here?
|
||||
iden, err := o.getIdentityFunc(ctx, o, claims.Email)
|
||||
if err != nil {
|
||||
return nil, errs.Wrap(http.StatusInternalServerError, err, "oidc.AuthorizeSSHSign")
|
||||
}
|
||||
|
|
Loading…
Reference in a new issue