[CXP-295] fix: support authSetting profile field as fallback when IDP discovery fails#40
Conversation
… fails When site-auth-configurations returns 404 (e.g. older on-premises Tableau Server <2023.3), ListIdpConfigurations returns an empty list and CreateAccount proceeds without an idpConfigurationId. Tableau then defaults to TableauIDWithMFA, which is wrong for customers using SAML/OIDC. This adds an authSetting profile field fallback: if IDP discovery yields no result and the caller provides "authSetting" in the account profile (e.g. "SAML", "OPENID"), it is passed directly to AddUserToSite, bypassing discovery entirely. Co-Authored-By: Claude Sonnet 4.6 <noreply@anthropic.com>
|
Claude finished @luisina-santos's task in 1m 30s —— View job PR Review:
|
Summary
authSettingas an optional account profile field inCreateAccountsite-auth-configurationsreturns 404 on older on-premises Tableau Server <2023.3), the caller can now pass"authSetting": "SAML"(or"OPENID") in the profile to control the auth method directlyTableauIDWithMFAwhen noidpConfigurationIdis provided — wrong for customers using SAML/Okta (CXP-295, Zscaler)Context
This is a follow-up to the v0.1.9 fix (commit
8c28935) which absorbed the 404 fromsite-auth-configurationsgracefully. That fix stopped the hard failure but introduced silent wrong behavior: users were provisioned withTableauIDWithMFAinstead of the site's SAML IDP.Test plan
--api-version 3.21forces 404 → user created withauthSetting=TableauIDWithMFA(wrong)--api-version 3.21+"authSetting":"SAML"in profile → sync confirmsauthSetting=SAMLauthSetting=SAMLviaidpConfigurationId)withMFA=truepath or multi-IDP error pathQA plan: https://www.notion.so/31f4694ad846811db45be8d39ab5a7ca
🤖 Generated with Claude Code