diff --git a/openmetadata-docs/content/deployment/security/amazon-cognito-sso/index.md b/openmetadata-docs/content/deployment/security/amazon-cognito-sso/index.md index 117dd5e5ab4..4bd20e15181 100644 --- a/openmetadata-docs/content/deployment/security/amazon-cognito-sso/index.md +++ b/openmetadata-docs/content/deployment/security/amazon-cognito-sso/index.md @@ -7,7 +7,7 @@ slug: /deployment/security/amazon-cognito Follow the sections in this guide to set up Amazon Cognito SSO. - +## Create Server Credentials ### Step 1: Login to AWS Portal @@ -54,8 +54,6 @@ Follow the sections in this guide to set up Amazon Cognito SSO. create-account - - After the applying these steps, you can update the configuration of your deployment: diff --git a/openmetadata-docs/content/deployment/security/auth0/index.md b/openmetadata-docs/content/deployment/security/auth0/index.md index ce54bf3f8ab..5b19cc5158a 100644 --- a/openmetadata-docs/content/deployment/security/auth0/index.md +++ b/openmetadata-docs/content/deployment/security/auth0/index.md @@ -7,7 +7,7 @@ slug: /deployment/security/auth0 Follow the sections in this guide to set up Auth0 SSO. - +## Create Server Credentials ### Step 1: Create the Account @@ -47,9 +47,7 @@ Follow the sections in this guide to set up Auth0 SSO. credentials - - - +## Create Service Account This section will guide to create the Ingestion Bot service account. @@ -109,8 +107,6 @@ This section will guide to create the Ingestion Bot service account. auth - - After the applying these steps, you can update the configuration of your deployment: diff --git a/openmetadata-docs/content/deployment/security/azure/index.md b/openmetadata-docs/content/deployment/security/azure/index.md index f0600c47d5b..214436dff22 100644 --- a/openmetadata-docs/content/deployment/security/azure/index.md +++ b/openmetadata-docs/content/deployment/security/azure/index.md @@ -7,7 +7,7 @@ slug: /deployment/security/azure Follow the sections in this guide to set up Azure SSO. - +## Create Server Credentials ### Step 1: Login to Azure Active Directory @@ -49,9 +49,7 @@ Admin permissions are required to register the application on the Azure portal. "authority": "https://login.microsoftonline.com/c11234b7c-b1b2-9854-0mn1-56abh3dea295" ``` - - - +## Create Service Application ### Step 1: Access Tokens and ID Tokens @@ -158,9 +156,6 @@ This information is required to configure Airflow. client-id-authority - - - After the applying these steps, you can update the configuration of your deployment: diff --git a/openmetadata-docs/content/deployment/security/custom-oidc/index.md b/openmetadata-docs/content/deployment/security/custom-oidc/index.md index 26245c22553..6687541a612 100644 --- a/openmetadata-docs/content/deployment/security/custom-oidc/index.md +++ b/openmetadata-docs/content/deployment/security/custom-oidc/index.md @@ -7,22 +7,16 @@ slug: /deployment/security/custom-oidc Follow the sections in this guide to set up Custom OIDC SSO. - +## Create Server Credentials - Go to the console of your preferred custom OIDC SSO provider - Create an OIDC client application with implicit flow enabled to get a client ID. - - ### Create Client ID and Secret Key - Navigate to your preferred OIDC provider console and create an OIDC client application. - Generate client ID and secret key in JSON format. - - - - After the applying these steps, you can update the configuration of your deployment: diff --git a/openmetadata-docs/content/deployment/security/google/index.md b/openmetadata-docs/content/deployment/security/google/index.md index 7888b56af67..c059051fd02 100644 --- a/openmetadata-docs/content/deployment/security/google/index.md +++ b/openmetadata-docs/content/deployment/security/google/index.md @@ -7,7 +7,7 @@ slug: /deployment/security/google Follow the sections in this guide to set up Google SSO. - +## Create Server Credentials ### Step 1: Create the Account - Go to [Create Google Cloud Account](https://console.cloud.google.com/) @@ -72,9 +72,8 @@ After selecting the **Application Type**, name your project and give the authori - You will find the **Client ID** and **Client Secret** in the top right corner find-clientid-and-secret - +## Create Service Account - This is a guide to create ingestion bot service account. ### Step 1: Create Service-Account @@ -136,8 +135,6 @@ Ensure that the Service Account ID is **ingestion-bot** and click on **CREATE AN - The private-key/service-account JSON file will be downloaded. - - After the applying these steps, you can update the configuration of your deployment: diff --git a/openmetadata-docs/content/deployment/security/keycloak/index.md b/openmetadata-docs/content/deployment/security/keycloak/index.md index 1c2f77198c8..6d0f8e8e264 100644 --- a/openmetadata-docs/content/deployment/security/keycloak/index.md +++ b/openmetadata-docs/content/deployment/security/keycloak/index.md @@ -7,7 +7,7 @@ slug: /deployment/security/keycloak Follow the sections in this guide to set up Keycloak SSO. - +## Create Server Credentials ### Step 1: Access the Keycloak Admin Console @@ -57,8 +57,6 @@ Follow the sections in this guide to set up Keycloak SSO. client-service-account.png - - After the applying these steps, the users in your realm are able to login in the openmetadata, as a suggestion create a user called "admin-user". Now you can update the configuration of your deployment: diff --git a/openmetadata-docs/content/deployment/security/okta/index.md b/openmetadata-docs/content/deployment/security/okta/index.md index 77da3643623..e3c84261ef6 100644 --- a/openmetadata-docs/content/deployment/security/okta/index.md +++ b/openmetadata-docs/content/deployment/security/okta/index.md @@ -7,7 +7,8 @@ slug: /deployment/security/okta Follow the sections in this guide to set up Okta SSO. - +## Create Server Credentials + This document will explain how to create an Okta app and configure it for OAuth. This will generate the information required for Single Sign On with Okta. ### Step 1: Create an Okta Account @@ -114,9 +115,8 @@ The Issuer URL shows up as Dynamic by default. Change the Issuer URL to Okta URL - The **Audience** is the same as the Client ID. click-edit-token - +## Create Service Application - This is a guide to create ingestion bot service app. ### Step 1: Generate Public/Private Key Pair @@ -197,8 +197,6 @@ curl --location --request POST '/oauth2/v1/clients' \ - To get more information on the Scopes. Visit the [Doc](https://developer.okta.com/docs/guides/implement-oauth-for-okta/scopes/). - - After the applying these steps, you can update the configuration of your deployment: diff --git a/openmetadata-docs/content/deployment/security/one-login/index.md b/openmetadata-docs/content/deployment/security/one-login/index.md index 648155902ae..f7b9091fa70 100644 --- a/openmetadata-docs/content/deployment/security/one-login/index.md +++ b/openmetadata-docs/content/deployment/security/one-login/index.md @@ -7,7 +7,7 @@ slug: /deployment/security/one-login Follow the sections in this guide to set up OneLogin SSO. - +## Create Server Credentials ### Step 1: Configure a new Application @@ -44,9 +44,7 @@ Follow the sections in this guide to set up OneLogin SSO. - Copy the Issuer URL - - - +## Create Service Account ### Create Secret Key @@ -54,8 +52,6 @@ Follow the sections in this guide to set up OneLogin SSO. create-account - - After the applying these steps, you can update the configuration of your deployment: