Skip to content

Commit 5b986ed

Browse files
authored
set oidc.map_legacy_users false (#2350)
1 parent 8076c94 commit 5b986ed

File tree

3 files changed

+8
-3
lines changed

3 files changed

+8
-3
lines changed

CHANGELOG.md

+5
Original file line numberDiff line numberDiff line change
@@ -2,6 +2,11 @@
22

33
## Next
44

5+
### Changes
6+
7+
- `oidc.map_legacy_users` is now `false` by default
8+
[#2350](https://github.com/juanfont/headscale/pull/2350)
9+
510
## 0.24.0 (2025-01-17)
611

712
### Security fix: OIDC changes in Headscale 0.24.0

config-example.yaml

+2-2
Original file line numberDiff line numberDiff line change
@@ -384,10 +384,10 @@ unix_socket_permission: "0770"
384384
# # Note that this will only work if the username from the legacy user is the same
385385
# # and there is a possibility for account takeover should a username have changed
386386
# # with the provider.
387-
# # Disabling this feature will cause all new logins to be created as new users.
387+
# # When this feature is disabled, it will cause all new logins to be created as new users.
388388
# # Note this option will be removed in the future and should be set to false
389389
# # on all new installations, or when all users have logged in with OIDC once.
390-
# map_legacy_users: true
390+
# map_legacy_users: false
391391

392392
# Logtail configuration
393393
# Logtail is Tailscales logging and auditing infrastructure, it allows the control panel

hscontrol/types/config.go

+1-1
Original file line numberDiff line numberDiff line change
@@ -319,7 +319,7 @@ func LoadConfig(path string, isFile bool) error {
319319
viper.SetDefault("oidc.only_start_if_oidc_is_available", true)
320320
viper.SetDefault("oidc.expiry", "180d")
321321
viper.SetDefault("oidc.use_expiry_from_token", false)
322-
viper.SetDefault("oidc.map_legacy_users", true)
322+
viper.SetDefault("oidc.map_legacy_users", false)
323323
viper.SetDefault("oidc.pkce.enabled", false)
324324
viper.SetDefault("oidc.pkce.method", "S256")
325325

0 commit comments

Comments
 (0)