Description
There are two scenarios I haven't figured out the workflow behind the scenes (note: this may not be a software issue but rather something to understand for documentation purpose):
-
Revoking API access after the user has been disabled in the IdP
Since the user can no longer authenticate to the rack, it would seem that there is nothing to trigger the expiration of the person's device tokens. The only way I can think of is attempting to perform IdP user import whenever the user makes an API call - which seems like a prohibitively expensive operation. -
Sync group membership info in Oxide rack without depending on user logging into console
Similar to the above scenario, if the user import event happens only during console login, their group membership information in the rack may be stale. If the user is working mostly with API and rarely uses the console, how would their project access permissions be kept up to date if the IAM roles are configured with groups?
cc/ @davepacheco (This may be related to #2302 but this is a more specific question about IdP sync.)