Merge identites by email overrides the original user_id
See original GitHub issueI am using the rule to merge identites by email. However, when merge occurs, the user changes its user_id
to the last recently identity added.
Such behavior causes a lot of identity issues - for example, when you try to get the user in a database using the user_id
as search key.
Instead of overriding the original user_id
, this rule should just add the new identity to the original one, and keep it’s user_id
Issue Analytics
- State:
- Created 7 years ago
- Reactions:17
- Comments:36 (16 by maintainers)
Top Results From Across the Web
Best Practices for Identifying Users | Segment Documentation
Segment's Identify method lets you link a user to their actions and record traits about them. It includes a unique User ID, and...
Read more >Override user.name and user.email used in git with the ones ...
Using ´git config user.name somebody´or ´git config user.email some@email.com´ . The problem is, that the user do not have this information set ...
Read more >Identity model customization in ASP.NET Core | Microsoft Learn
This article describes how to customize the underlying Entity Framework Core data model for ASP.NET Core Identity.
Read more >Understand How Metadata Works in User Profiles - Auth0
The metadata can be modified as part of a user's login flow. ... user root attributes are updated by the identity provider only...
Read more >Chapter 33. Using an ID view to override a user attribute value ...
If an Identity Management (IdM) user would like to override some of their user or group attributes stored in the IdM LDAP server,...
Read more >Top Related Medium Post
No results found
Top Related StackOverflow Question
No results found
Troubleshoot Live Code
Lightrun enables developers to add logs, metrics and snapshots to live code - no restarts or redeploys required.
Start FreeTop Related Reddit Thread
No results found
Top Related Hackernoon Post
No results found
Top Related Tweet
No results found
Top Related Dev.to Post
No results found
Top Related Hashnode Post
No results found
Top GitHub Comments
We’re still working on docs for this issue, but the feature is ready and has been rolled out. To use it, set
context.primaryUser = primaryUserId
(whereprimaryUserId === 'auth0|foo123'
for example).Sample Rule:
Note: If you see the
Unable to construct sso user.
error, odds are that it’s caused due to settingcontext.primaryUser
to a non-existentuser_id
.Could you guys thumbs-up to let me know if this fixes the original issue you had?
I’ll close it once docs are in place and the Rule templates have been updated.
I’m in for a +1 on this also and would propose re-opening it since it doesn’t seem inactive anymore.
One of the reasons I (and I assume others) pay for Auth0 is so that you guys manage the user database for me and I don’t have to. I can rely on the user ID that comes back in tokens and API requests to know which user it is. The problem with this account linking setup is that once a new login method is introduced and a user uses it, the old user ID essentially disappears. The only way to know about it is for me to keep a database or list of users and user IDs on my end which I don’t want to do.
However, I do appreciate the technical complexity that is involved. The user starts the login with one user ID and after the rule hits gets a different one. Certainly bizarre. I just think this is a valid feature/enhancement request and unless it’s a wontfix it would be nice to track progress somewhere.