IdentityServer / OIDC claims and roles

Hope you can help.

We are hosting our own Squidex and have setup authentication against our separate IdentityServer 4 server by setting the OIDC settings is appsettings.json. I am a bit confused - we have many users who can login to IdentityServer - some should be able to access Squidex and some should not. The ones that can access Squidex we want to have map to different Squidex roles - admins etc. What roles or claims do we need achieve this?
Example
Joe Bloggs is a valid IDS user and should be able to access Squidex as an administrator
Jane Doe is a valid IDS user and should be able to access Squidex as a content author
Jim Beam is a valid IDS user but should not have any access to Squidex

Any advice is really appreciated

You cannot stop people from using Squidex, BUT…

  1. You can map users to become admins:

Give them an admin permission

The claim types: urn:squidex:permissions=squidex.*
https://github.com/Squidex/squidex/blob/835274396f58f9b9f8f11bab8956639337a97a5b/backend/src/Squidex.Shared/Identity/SquidexClaimTypes.cs

The permissions:

  1. Disable the creation of apps:
    https://github.com/Squidex/squidex/blob/835274396f58f9b9f8f11bab8956639337a97a5b/backend/src/Squidex/appsettings.json#L67

  2. Lock new users automatically:
    https://github.com/Squidex/squidex/blob/835274396f58f9b9f8f11bab8956639337a97a5b/backend/src/Squidex/appsettings.json#L464

  3. Use appropriate roles for your other users when you invite them to the app.

Thanks so much Sebastian for your quick reply :grinning: