mirror of
https://github.com/open-metadata/OpenMetadata.git
synced 2025-08-27 18:36:08 +00:00
Removed Collapse Component in enable security pages in docs (#7437)
This commit is contained in:
parent
b8fd072e48
commit
c0f122a42d
@ -7,7 +7,7 @@ slug: /deployment/security/amazon-cognito
|
||||
|
||||
Follow the sections in this guide to set up Amazon Cognito SSO.
|
||||
|
||||
<Collapse title="Create Server Credentials">
|
||||
## Create Server Credentials
|
||||
|
||||
### Step 1: Login to AWS Portal
|
||||
|
||||
@ -54,8 +54,6 @@ Follow the sections in this guide to set up Amazon Cognito SSO.
|
||||
|
||||
<Image src="/images/deployment/security/amazon-cognito-sso/create-server-credentials-8.png" alt="create-account" caption="Client ID"/>
|
||||
|
||||
</Collapse>
|
||||
|
||||
After the applying these steps, you can update the configuration of your deployment:
|
||||
|
||||
<InlineCalloutContainer>
|
||||
|
@ -7,7 +7,7 @@ slug: /deployment/security/auth0
|
||||
|
||||
Follow the sections in this guide to set up Auth0 SSO.
|
||||
|
||||
<Collapse title="Create Server Credentials">
|
||||
## Create Server Credentials
|
||||
|
||||
### Step 1: Create the Account
|
||||
|
||||
@ -47,9 +47,7 @@ Follow the sections in this guide to set up Auth0 SSO.
|
||||
|
||||
<Image src="/images/deployment/security/auth0/credentials.png" alt="credentials"/>
|
||||
|
||||
</Collapse>
|
||||
|
||||
<Collapse title="Create Service Account">
|
||||
## Create Service Account
|
||||
|
||||
This section will guide to create the Ingestion Bot service account.
|
||||
|
||||
@ -109,8 +107,6 @@ This section will guide to create the Ingestion Bot service account.
|
||||
|
||||
<Image src="/images/deployment/security/auth0/authorize-api-6.png" alt="auth"/>
|
||||
|
||||
</Collapse>
|
||||
|
||||
After the applying these steps, you can update the configuration of your deployment:
|
||||
|
||||
<InlineCalloutContainer>
|
||||
|
@ -7,7 +7,7 @@ slug: /deployment/security/azure
|
||||
|
||||
Follow the sections in this guide to set up Azure SSO.
|
||||
|
||||
<Collapse title="Create Server Credentials">
|
||||
## Create Server Credentials
|
||||
|
||||
### Step 1: Login to Azure Active Directory
|
||||
|
||||
@ -49,9 +49,7 @@ Admin permissions are required to register the application on the Azure portal.
|
||||
"authority": "https://login.microsoftonline.com/c11234b7c-b1b2-9854-0mn1-56abh3dea295"
|
||||
```
|
||||
|
||||
</Collapse>
|
||||
|
||||
<Collapse title="Create Service Application">
|
||||
## Create Service Application
|
||||
|
||||
### Step 1: Access Tokens and ID Tokens
|
||||
|
||||
@ -158,9 +156,6 @@ This information is required to configure Airflow.
|
||||
|
||||
<Image src="/images/deployment/security/azure/client-id-and-authority.png" alt="client-id-authority"/>
|
||||
|
||||
|
||||
</Collapse>
|
||||
|
||||
After the applying these steps, you can update the configuration of your deployment:
|
||||
|
||||
<InlineCalloutContainer>
|
||||
|
@ -7,22 +7,16 @@ slug: /deployment/security/custom-oidc
|
||||
|
||||
Follow the sections in this guide to set up Custom OIDC SSO.
|
||||
|
||||
<Collapse title="Create Server Credentials">
|
||||
## Create Server Credentials
|
||||
|
||||
- Go to the console of your preferred custom OIDC SSO provider
|
||||
- Create an OIDC client application with implicit flow enabled to get a client ID.
|
||||
|
||||
</Collapse>
|
||||
|
||||
### Create Client ID and Secret Key
|
||||
|
||||
- Navigate to your preferred OIDC provider console and create an OIDC client application.
|
||||
- Generate client ID and secret key in JSON format.
|
||||
|
||||
<Collapse title="Create Service Account">
|
||||
|
||||
</Collapse>
|
||||
|
||||
After the applying these steps, you can update the configuration of your deployment:
|
||||
|
||||
<InlineCalloutContainer>
|
||||
|
@ -7,7 +7,7 @@ slug: /deployment/security/google
|
||||
|
||||
Follow the sections in this guide to set up Google SSO.
|
||||
|
||||
<Collapse title="Create Server Credentials">
|
||||
## Create Server Credentials
|
||||
|
||||
### Step 1: Create the Account
|
||||
- Go to [Create Google Cloud Account](https://console.cloud.google.com/)
|
||||
@ -72,9 +72,8 @@ After selecting the **Application Type**, name your project and give the authori
|
||||
- You will find the **Client ID** and **Client Secret** in the top right corner
|
||||
<Image src="/images/deployment/security/google/find-clientid-and-secret.png" alt="find-clientid-and-secret"/>
|
||||
|
||||
</Collapse>
|
||||
## Create Service Account
|
||||
|
||||
<Collapse title="Create Service Account">
|
||||
This is a guide to create ingestion bot service account.
|
||||
|
||||
### Step 1: Create Service-Account
|
||||
@ -136,8 +135,6 @@ Ensure that the Service Account ID is **ingestion-bot** and click on **CREATE AN
|
||||
|
||||
- The private-key/service-account JSON file will be downloaded.
|
||||
|
||||
</Collapse>
|
||||
|
||||
After the applying these steps, you can update the configuration of your deployment:
|
||||
|
||||
<InlineCalloutContainer>
|
||||
|
@ -7,7 +7,7 @@ slug: /deployment/security/keycloak
|
||||
|
||||
Follow the sections in this guide to set up Keycloak SSO.
|
||||
|
||||
<Collapse title="Create Server Credentials">
|
||||
## Create Server Credentials
|
||||
|
||||
### Step 1: Access the Keycloak Admin Console
|
||||
|
||||
@ -57,8 +57,6 @@ Follow the sections in this guide to set up Keycloak SSO.
|
||||
|
||||
<Image src="/images/deployment/security/keycloak/7-client-service-account.png" alt="client-service-account.png"/>
|
||||
|
||||
</Collapse>
|
||||
|
||||
After the applying these steps, the users in your realm are able to login in the openmetadata, as a suggestion create a user called "admin-user". Now you can update the configuration of your deployment:
|
||||
|
||||
<InlineCalloutContainer>
|
||||
|
@ -7,7 +7,8 @@ slug: /deployment/security/okta
|
||||
|
||||
Follow the sections in this guide to set up Okta SSO.
|
||||
|
||||
<Collapse title="Create Server Credentials">
|
||||
## Create Server Credentials
|
||||
|
||||
This document will explain how to create an Okta app and configure it for OAuth. This will generate the information required for Single Sign On with Okta.
|
||||
|
||||
### Step 1: Create an Okta Account
|
||||
@ -114,9 +115,8 @@ The Issuer URL shows up as Dynamic by default. Change the Issuer URL to Okta URL
|
||||
- The **Audience** is the same as the Client ID.
|
||||
<Image src="/images/deployment/security/okta/click-edit-token.png" alt="click-edit-token"/>
|
||||
|
||||
</Collapse>
|
||||
## Create Service Application
|
||||
|
||||
<Collapse title="Create Service Application">
|
||||
This is a guide to create ingestion bot service app.
|
||||
|
||||
### Step 1: Generate Public/Private Key Pair
|
||||
@ -197,8 +197,6 @@ curl --location --request POST '<domain-url>/oauth2/v1/clients' \
|
||||
|
||||
- To get more information on the Scopes. Visit the [Doc](https://developer.okta.com/docs/guides/implement-oauth-for-okta/scopes/).
|
||||
|
||||
</Collapse>
|
||||
|
||||
After the applying these steps, you can update the configuration of your deployment:
|
||||
|
||||
<InlineCalloutContainer>
|
||||
|
@ -7,7 +7,7 @@ slug: /deployment/security/one-login
|
||||
|
||||
Follow the sections in this guide to set up OneLogin SSO.
|
||||
|
||||
<Collapse title="Create Server Credentials">
|
||||
## Create Server Credentials
|
||||
|
||||
### Step 1: Configure a new Application
|
||||
|
||||
@ -44,9 +44,7 @@ Follow the sections in this guide to set up OneLogin SSO.
|
||||
|
||||
- Copy the Issuer URL
|
||||
|
||||
</Collapse>
|
||||
|
||||
<Collapse title="Create Service Account">
|
||||
## Create Service Account
|
||||
|
||||
### Create Secret Key
|
||||
|
||||
@ -54,8 +52,6 @@ Follow the sections in this guide to set up OneLogin SSO.
|
||||
|
||||
<Image src="/images/deployment/security/one-login/create-service-account.png" alt="create-account"/>
|
||||
|
||||
</Collapse>
|
||||
|
||||
After the applying these steps, you can update the configuration of your deployment:
|
||||
|
||||
<InlineCalloutContainer>
|
||||
|
Loading…
x
Reference in New Issue
Block a user