Minor corrections in SSO related docs (#7356)

This commit is contained in:
Nahuel 2022-09-12 05:06:30 +02:00 committed by GitHub
parent 6887a88725
commit a60f6dc934
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
7 changed files with 39 additions and 13 deletions

View File

@ -5,12 +5,14 @@ slug: /deployment/bare-metal/security
# Bare Metal Security
Follow the steps for setting up the SSO, and then check the specific `Bare Metal` section of your chosen SSO.
<InlineCalloutContainer>
<InlineCallout
color="violet-70"
bold="Auth0 SSO"
icon="add_moderator"
href="/deployment/security/auth0/bare-metal"
href="/deployment/security/auth0"
>
Configure Auth0 SSO to access the UI and APIs
</InlineCallout>
@ -18,7 +20,7 @@ slug: /deployment/bare-metal/security
color="violet-70"
bold="Azure SSO"
icon="add_moderator"
href="/deployment/security/azure/bare-metal"
href="/deployment/security/azure"
>
Configure Azure SSO to access the UI and APIs
</InlineCallout>
@ -26,7 +28,7 @@ slug: /deployment/bare-metal/security
color="violet-70"
bold="Custom OIDC SSO"
icon="add_moderator"
href="/deployment/security/custom-oidc/bare-metal"
href="/deployment/security/custom-oidc"
>
Configure a Custom OIDC SSO to access the UI and APIs
</InlineCallout>
@ -34,7 +36,7 @@ slug: /deployment/bare-metal/security
color="violet-70"
bold="Google SSO"
icon="add_moderator"
href="/deployment/security/google/bare-metal"
href="/deployment/security/google"
>
Configure Google SSO to access the UI and APIs
</InlineCallout>
@ -42,8 +44,32 @@ slug: /deployment/bare-metal/security
color="violet-70"
bold="Okta SSO"
icon="add_moderator"
href="/deployment/security/okta/bare-metal"
href="/deployment/security/okta"
>
Configure Okta SSO to access the UI and APIs
</InlineCallout>
<InlineCallout
color="violet-70"
bold="Amazon Cognito SSO"
icon="add_moderator"
href="/deployment/security/amazon-cognito"
>
Configure Amazon Cognito SSO to access the UI and APIs
</InlineCallout>
<InlineCallout
color="violet-70"
bold="OneLogin SSO"
icon="add_moderator"
href="/deployment/security/one-login"
>
Configure OneLogin SSO to access the UI and APIs
</InlineCallout>
<InlineCallout
color="violet-70"
bold="Keycloak SSO"
icon="add_moderator"
href="/deployment/security/keycloak"
>
Configure Keycloak SSO to access the UI and APIs
</InlineCallout>
</InlineCalloutContainer>

View File

@ -37,5 +37,5 @@ from [Enabling JWT Tokens](/deployment/security/enable-jwt-tokens).
## 2. Start Docker
```commandline
docker compose --env-file ~/openmetadata.env up -d
docker compose --env-file ~/openmetadata_cognito.env up -d
```

View File

@ -39,5 +39,5 @@ OM_AUTH_AIRFLOW_CUSTOM_OIDC_TOKEN_ENDPOINT_URL={endpoint}
## 2. Start Docker
```commandline
docker compose --env-file ~/openmetadata_azure.env up -d
docker compose --env-file ~/openmetadata_oidc.env up -d
```

View File

@ -18,9 +18,9 @@ In this section we will guide you through adding SSL to your OpenMetadata deploy
</InlineCallout>
<InlineCallout
color="violet-70"
bold="Azure SSO"
bold="Use the OpenMetadata Server"
icon="add_moderator"
href="/deployment/security/enable-ssl/jwt"
href="/deployment/security/enable-ssl/openmetadata-server"
>
Set SSL directly at the OpenMetadata server.
</InlineCallout>

View File

@ -34,5 +34,5 @@ OM_AUTH_AIRFLOW_GOOGLE_SECRET_KEY_PATH=/path/to/secret.json
## 2. Start Docker
```commandline
docker compose --env-file ~/openmetadata.env up -d
docker compose --env-file ~/openmetadata_google.env up -d
```

View File

@ -9,7 +9,7 @@ To enable security for the Docker deployment, follow the next steps:
## 1. Create an .env file
Create an `openmetadata_oidc.env` file and add the following contents as an example. Use the information
Create an `openmetadata_keycloak.env` file and add the following contents as an example. Use the information
generated when setting up the account.
The configuration below already uses the presets shown in the example of keycloak configurations, you can change to yours.
@ -39,5 +39,5 @@ OM_AUTH_AIRFLOW_CUSTOM_OIDC_TOKEN_ENDPOINT_URL="http://localhost:8080/realms/dat
## 2. Start Docker
```commandline
docker compose --env-file ~/openmetadata_azure.env up -d
docker compose --env-file ~/openmetadata_keycloak.env up -d
```

View File

@ -40,5 +40,5 @@ OM_AUTH_AIRFLOW_OKTA_SCOPES={OM_AUTH_AIRFLOW_OKTA_SCOPES:-[]}
## 2. Start Docker
```commandline
docker compose --env-file ~/openmetadata_azure.env up -d
docker compose --env-file ~/openmetadata_okta.env up -d
```