-
Notifications
You must be signed in to change notification settings - Fork 8
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add visibility restrictions in the developer portal based on the Organizations #3061
Comments
Initial implementation wso2/carbon-apimgt#12512 This PR set visibility restriction for API using organization and filter API in the dev portal listing page based on the user organization |
Add Application sharing for with the organization wso2/carbon-apimgt#12517 |
Publisher side UI changes to set organization visibility to APIs wso2/apim-apps#729 |
Additional fixes wso2/carbon-apimgt#12519 wso2/carbon-apimgt#12521 |
Add application sharing with the organization wso2/apim-apps#730 |
Add capability to add organizations to business plans and filter it in the devportal for the API based on user organization wso2/carbon-apimgt#12523 |
Moving to registry property to store organization information instead of introducing new field to rxt. Above change needs carbon-registry fix wso2/carbon-registry#440 as well. Currently we can only search with one registry property. with this we can use multiple properties |
Since there is a new property added to the API, we need to do a registry resource migration. To prevent this, we could add a default property value to all the migrated API when generating the indexed data. Following PRs do this wso2/carbon-apimgt#12529 When migrating to the new version, with this change, we have to do a reindexing only |
Setup IS 7.0 with APIM developer portal. IS 7 is setup as a federated authenticator. We need to add custom oidc claims to retrieve organization and organization id since it is not available in APIM Steps on configuring can be found in https://docs.google.com/document/d/1MpsVrYCL4lT5p6rjB_ViAbU09yCCyzTLuDII9Clcsq0/edit?usp=sharing |
Show organization name in dev portal UI from wso2/apim-apps#742 Additional bug fixes wso2/carbon-apimgt#12559 |
Based on the review , moved the org visibility to its own field in publisher portal configuration section https://git Additionally, introduced a config to enable org feature
carbon-apimgt related changes for above two changes wso2/carbon-apimgt#12572 |
Fix logout issue wso2/apim-apps#751 Additionally, Provide capability to show organization specific token and authorization endpoint in the dev portal For this to work, need to provide a templated url to the keymanager connector display url. |
After discussion, planned to get implement keymanager visibilty based on user organization. This way, we will have to register keymanager per organization. Backend pr for this wso2/carbon-apimgt#12592 This introduces new table
|
Add keymanager visibility UI wso2/apim-apps#780 |
Add capability to enable/disable feature wso2/apim-apps#783 config
|
Refactor business plans wso2/carbon-apimgt#12634 |
Add capability to use multiple keymanagers with same issuer with wso2/carbon-apimgt#12652 To differentiate the keymanage, Need to configure 'Token Handling Options' section in the keymanager This example, based on organization filed in the access token, relavant KM is selected |
Add support for orgs with spaces in the name |
Fix logout issue for publisher wso2/apim-apps#795 Bug fixes wso2/carbon-apimgt#12655 |
Provide a config to change the claim that is used for organization resolving. wso2/carbon-apimgt#12670 Now you can set organization id or any claim as the organization
|
Pending Tasks
|
Problem
Need to restrict API and applications based on the user organization. Refer https://docs.google.com/document/d/1U_rYpwpKyvM_hEzUzUVHJ7Gu-N-xu7Of97r4cRxlMQM/edit
Tasks
The text was updated successfully, but these errors were encountered: