-
Notifications
You must be signed in to change notification settings - Fork 4
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
ORCID as Social Identity Provider #126
Comments
Btw, ORCID currently doesn't release email in OAuth2. I spoke with the supporters and they do plan to release it in the future but need to better understand the privacy model. |
Great! Good to know that they're already considering adding support for email. In the mean time, we'll investigate developing a custom (Oauth2 based) Identity Provider that can interact with ORCID's record API: https://orcid.github.io/orcid-api-tutorial/read/ From our experience with the PHP based implementation we developed for SimpleSAMLphp, the ORCID record API can release the email information with some caveats:
So in both cases the user is required to modify the visibility settings for the email addresses in their profile. The proper OIDC(OAuth2) way would be to allow the user to authorise the standard email scope to decide whether they want to release their email address for the given client. |
ORCID id icon library: https://orcid.figshare.com/articles/figure/ORCID_iD_icon_graphics/5008697 |
I have done an implementation for making PR to Keycloak in order to support ORCID as social IdP. This implementation is being extended for our needs with the following:
Finally, we open a dev discussion for overcoming problems for large User Attribute like publications. User Attribute value is 255 length. This is insufficient for large fields. |
Moreover for related #125 : If admin wants orcid User attribute being able to change, he should createUser Attribute Mapper with force Sync Mode Override. |
PR: keycloak#8618 |
Keycloak team reject our PR for ORCID Social Identity Provider because they do not want to maintain/support it. I have created a Keycloak extension for ORCID Social Identity Provider and make PR in order to be official Keycloak extension. Extension jira issue: https://issues.redhat.com/browse/KEYCLOAK-19595. Emailverified is not added in extension. However, it is related with the following PR. In this PR, Keycloak team want to extend User Attribute Mapper in order to being able to change User field emailVerified. However, PR is stack to their review. After accepting this PR, realm admin will be able to create appropriate User Attribute Mapper for emailVerified for ORCID IdP. We have added ORCID logo to our vanilla theme ( current branch icons). |
Related jira issue for problems with mappers and emailVerified: #136 |
ORCID as Social Identity Provider is official Keycloak extension. |
Use ORCID public/member API for OAuth2 2-legged flow and access to ORCID record, including:
See also implementation for SimpleSAMLphp
The text was updated successfully, but these errors were encountered: