mirror of
https://github.com/open-metadata/OpenMetadata.git
synced 2025-08-24 17:08:28 +00:00
Minor corrections in SSO related docs (#7356)
This commit is contained in:
parent
6887a88725
commit
a60f6dc934
@ -5,12 +5,14 @@ slug: /deployment/bare-metal/security
|
||||
|
||||
# Bare Metal Security
|
||||
|
||||
Follow the steps for setting up the SSO, and then check the specific `Bare Metal` section of your chosen SSO.
|
||||
|
||||
<InlineCalloutContainer>
|
||||
<InlineCallout
|
||||
color="violet-70"
|
||||
bold="Auth0 SSO"
|
||||
icon="add_moderator"
|
||||
href="/deployment/security/auth0/bare-metal"
|
||||
href="/deployment/security/auth0"
|
||||
>
|
||||
Configure Auth0 SSO to access the UI and APIs
|
||||
</InlineCallout>
|
||||
@ -18,7 +20,7 @@ slug: /deployment/bare-metal/security
|
||||
color="violet-70"
|
||||
bold="Azure SSO"
|
||||
icon="add_moderator"
|
||||
href="/deployment/security/azure/bare-metal"
|
||||
href="/deployment/security/azure"
|
||||
>
|
||||
Configure Azure SSO to access the UI and APIs
|
||||
</InlineCallout>
|
||||
@ -26,7 +28,7 @@ slug: /deployment/bare-metal/security
|
||||
color="violet-70"
|
||||
bold="Custom OIDC SSO"
|
||||
icon="add_moderator"
|
||||
href="/deployment/security/custom-oidc/bare-metal"
|
||||
href="/deployment/security/custom-oidc"
|
||||
>
|
||||
Configure a Custom OIDC SSO to access the UI and APIs
|
||||
</InlineCallout>
|
||||
@ -34,7 +36,7 @@ slug: /deployment/bare-metal/security
|
||||
color="violet-70"
|
||||
bold="Google SSO"
|
||||
icon="add_moderator"
|
||||
href="/deployment/security/google/bare-metal"
|
||||
href="/deployment/security/google"
|
||||
>
|
||||
Configure Google SSO to access the UI and APIs
|
||||
</InlineCallout>
|
||||
@ -42,8 +44,32 @@ slug: /deployment/bare-metal/security
|
||||
color="violet-70"
|
||||
bold="Okta SSO"
|
||||
icon="add_moderator"
|
||||
href="/deployment/security/okta/bare-metal"
|
||||
href="/deployment/security/okta"
|
||||
>
|
||||
Configure Okta SSO to access the UI and APIs
|
||||
</InlineCallout>
|
||||
<InlineCallout
|
||||
color="violet-70"
|
||||
bold="Amazon Cognito SSO"
|
||||
icon="add_moderator"
|
||||
href="/deployment/security/amazon-cognito"
|
||||
>
|
||||
Configure Amazon Cognito SSO to access the UI and APIs
|
||||
</InlineCallout>
|
||||
<InlineCallout
|
||||
color="violet-70"
|
||||
bold="OneLogin SSO"
|
||||
icon="add_moderator"
|
||||
href="/deployment/security/one-login"
|
||||
>
|
||||
Configure OneLogin SSO to access the UI and APIs
|
||||
</InlineCallout>
|
||||
<InlineCallout
|
||||
color="violet-70"
|
||||
bold="Keycloak SSO"
|
||||
icon="add_moderator"
|
||||
href="/deployment/security/keycloak"
|
||||
>
|
||||
Configure Keycloak SSO to access the UI and APIs
|
||||
</InlineCallout>
|
||||
</InlineCalloutContainer>
|
@ -37,5 +37,5 @@ from [Enabling JWT Tokens](/deployment/security/enable-jwt-tokens).
|
||||
## 2. Start Docker
|
||||
|
||||
```commandline
|
||||
docker compose --env-file ~/openmetadata.env up -d
|
||||
docker compose --env-file ~/openmetadata_cognito.env up -d
|
||||
```
|
||||
|
@ -39,5 +39,5 @@ OM_AUTH_AIRFLOW_CUSTOM_OIDC_TOKEN_ENDPOINT_URL={endpoint}
|
||||
## 2. Start Docker
|
||||
|
||||
```commandline
|
||||
docker compose --env-file ~/openmetadata_azure.env up -d
|
||||
docker compose --env-file ~/openmetadata_oidc.env up -d
|
||||
```
|
||||
|
@ -18,9 +18,9 @@ In this section we will guide you through adding SSL to your OpenMetadata deploy
|
||||
</InlineCallout>
|
||||
<InlineCallout
|
||||
color="violet-70"
|
||||
bold="Azure SSO"
|
||||
bold="Use the OpenMetadata Server"
|
||||
icon="add_moderator"
|
||||
href="/deployment/security/enable-ssl/jwt"
|
||||
href="/deployment/security/enable-ssl/openmetadata-server"
|
||||
>
|
||||
Set SSL directly at the OpenMetadata server.
|
||||
</InlineCallout>
|
||||
|
@ -34,5 +34,5 @@ OM_AUTH_AIRFLOW_GOOGLE_SECRET_KEY_PATH=/path/to/secret.json
|
||||
## 2. Start Docker
|
||||
|
||||
```commandline
|
||||
docker compose --env-file ~/openmetadata.env up -d
|
||||
docker compose --env-file ~/openmetadata_google.env up -d
|
||||
```
|
||||
|
@ -9,7 +9,7 @@ To enable security for the Docker deployment, follow the next steps:
|
||||
|
||||
## 1. Create an .env file
|
||||
|
||||
Create an `openmetadata_oidc.env` file and add the following contents as an example. Use the information
|
||||
Create an `openmetadata_keycloak.env` file and add the following contents as an example. Use the information
|
||||
generated when setting up the account.
|
||||
|
||||
The configuration below already uses the presets shown in the example of keycloak configurations, you can change to yours.
|
||||
@ -39,5 +39,5 @@ OM_AUTH_AIRFLOW_CUSTOM_OIDC_TOKEN_ENDPOINT_URL="http://localhost:8080/realms/dat
|
||||
## 2. Start Docker
|
||||
|
||||
```commandline
|
||||
docker compose --env-file ~/openmetadata_azure.env up -d
|
||||
docker compose --env-file ~/openmetadata_keycloak.env up -d
|
||||
```
|
||||
|
@ -40,5 +40,5 @@ OM_AUTH_AIRFLOW_OKTA_SCOPES={OM_AUTH_AIRFLOW_OKTA_SCOPES:-[]}
|
||||
## 2. Start Docker
|
||||
|
||||
```commandline
|
||||
docker compose --env-file ~/openmetadata_azure.env up -d
|
||||
docker compose --env-file ~/openmetadata_okta.env up -d
|
||||
```
|
||||
|
Loading…
x
Reference in New Issue
Block a user