diff --git a/openmetadata-docs/content/deployment/security/keycloak/bare-metal.md b/openmetadata-docs/content/deployment/security/keycloak/bare-metal.md index d745706870f..5ff4d587b82 100644 --- a/openmetadata-docs/content/deployment/security/keycloak/bare-metal.md +++ b/openmetadata-docs/content/deployment/security/keycloak/bare-metal.md @@ -19,8 +19,8 @@ authenticationConfiguration: provider: "custom-oidc" providerName: "KeyCloak" publicKeyUrls: - - "http://localhost:8080/realms/data-sec/protocol/openid-connect/certs" - authority: "http://localhost:8080/realms/data-sec" + - "http://localhost:8081/realms/data-sec/protocol/openid-connect/certs" + authority: "http://localhost:8081/realms/data-sec" clientId: "open-metadata" callbackUrl: "http://localhost:8585/callback" ``` diff --git a/openmetadata-docs/content/deployment/security/keycloak/docker.md b/openmetadata-docs/content/deployment/security/keycloak/docker.md index 7d315d120e8..8ccee67d238 100644 --- a/openmetadata-docs/content/deployment/security/keycloak/docker.md +++ b/openmetadata-docs/content/deployment/security/keycloak/docker.md @@ -26,8 +26,8 @@ AUTHORIZER_PRINCIPAL_DOMAIN=open-metadata.org # Update with your domain AUTHENTICATION_PROVIDER=custom-oidc CUSTOM_OIDC_AUTHENTICATION_PROVIDER_NAME=KeyCloak -AUTHENTICATION_PUBLIC_KEYS=[{http://localhost:8080/realms/data-sec/protocol/openid-connect/certs}] -AUTHENTICATION_AUTHORITY={http://localhost:8080/realms/data-sec} +AUTHENTICATION_PUBLIC_KEYS=[{http://localhost:8081/realms/data-sec/protocol/openid-connect/certs}] +AUTHENTICATION_AUTHORITY={http://localhost:8081/realms/data-sec} AUTHENTICATION_CLIENT_ID=open-metadata # Update with your Client ID AUTHENTICATION_CALLBACK_URL=http://localhost:8585/callback @@ -35,7 +35,7 @@ AUTHENTICATION_CALLBACK_URL=http://localhost:8585/callback AIRFLOW_AUTH_PROVIDER=custom-oidc OM_AUTH_AIRFLOW_CUSTOM_OIDC_CLIENT_ID=open-metadata # Update with your Client ID OM_AUTH_AIRFLOW_CUSTOM_OIDC_SECRET_KEY={Secret Key} # Update with your Secret Key -OM_AUTH_AIRFLOW_CUSTOM_OIDC_TOKEN_ENDPOINT_URL="http://localhost:8080/realms/data-sec/protocol/openid-connect/token" +OM_AUTH_AIRFLOW_CUSTOM_OIDC_TOKEN_ENDPOINT_URL="http://localhost:8081/realms/data-sec/protocol/openid-connect/token" ``` ### 1.1 After 0.12.1 @@ -50,8 +50,8 @@ AUTHORIZER_PRINCIPAL_DOMAIN=open-metadata.org # Update with your domain AUTHENTICATION_PROVIDER=custom-oidc CUSTOM_OIDC_AUTHENTICATION_PROVIDER_NAME=KeyCloak -AUTHENTICATION_PUBLIC_KEYS=[{http://localhost:8080/realms/data-sec/protocol/openid-connect/certs}] -AUTHENTICATION_AUTHORITY={http://localhost:8080/realms/data-sec} +AUTHENTICATION_PUBLIC_KEYS=[{http://localhost:8081/realms/data-sec/protocol/openid-connect/certs}] +AUTHENTICATION_AUTHORITY={http://localhost:8081/realms/data-sec} AUTHENTICATION_CLIENT_ID=open-metadata # Update with your Client ID AUTHENTICATION_CALLBACK_URL=http://localhost:8585/callback ``` diff --git a/openmetadata-docs/content/deployment/security/keycloak/index.md b/openmetadata-docs/content/deployment/security/keycloak/index.md index 6d0f8e8e264..1260897de27 100644 --- a/openmetadata-docs/content/deployment/security/keycloak/index.md +++ b/openmetadata-docs/content/deployment/security/keycloak/index.md @@ -103,5 +103,9 @@ workflowConfig: securityConfig: clientId: '{your_client_id}' secretKey: '{your_client_secret}' - domain: '{your_domain}' + tokenEndpoint: '{your_token_endpoint}' # e.g. http://localhost:8081/realms/data-sec/protocol/openid-connect/token ``` + + +A dockerized demo for showing how this SSO works with OpenMetadata can be found [here](https://github.com/open-metadata/openmetadata-demo/tree/main/keycloak-sso). + \ No newline at end of file diff --git a/openmetadata-docs/content/deployment/security/keycloak/kubernetes.md b/openmetadata-docs/content/deployment/security/keycloak/kubernetes.md index cc017638f66..03daa6bb9ad 100644 --- a/openmetadata-docs/content/deployment/security/keycloak/kubernetes.md +++ b/openmetadata-docs/content/deployment/security/keycloak/kubernetes.md @@ -33,8 +33,8 @@ global: authentication: provider: "custom-oidc" publicKeys: - - "http://localhost:8080/realms/data-sec/protocol/openid-connect/certs" - authority: "http://localhost:8080/realms/data-sec" + - "http://localhost:8081/realms/data-sec/protocol/openid-connect/certs" + authority: "http://localhost:8081/realms/data-sec" clientId: "{Client ID}" callbackUrl: "http://localhost:8585/callback" airflow: @@ -45,7 +45,7 @@ global: secretKey: secretRef: custom-oidc-key-secret secretKey: custom-oidc-key-secret - tokenEndpoint: "http://localhost:8080/realms/data-sec/protocol/openid-connect/token" + tokenEndpoint: "http://localhost:8081/realms/data-sec/protocol/openid-connect/token" ``` ### After 0.12.1 @@ -64,8 +64,8 @@ global: authentication: provider: "custom-oidc" publicKeys: - - "http://localhost:8080/realms/data-sec/protocol/openid-connect/certs" - authority: "http://localhost:8080/realms/data-sec" + - "http://localhost:8081/realms/data-sec/protocol/openid-connect/certs" + authority: "http://localhost:8081/realms/data-sec" clientId: "{Client ID}" callbackUrl: "http://localhost:8585/callback" ```