mirror of
https://github.com/open-metadata/OpenMetadata.git
synced 2025-09-04 06:33:10 +00:00
Minor: Fix docs to include jwt url from OM in all the principalURLs config (#14342)
This commit is contained in:
parent
a4f9b0ec4e
commit
c156e01e34
@ -16,6 +16,7 @@ authenticationConfiguration:
|
||||
provider: "aws-cognito"
|
||||
publicKeyUrls:
|
||||
- "https://cognito-idp.us-west-1.amazonaws.com/{User Pool ID}/.well-known/jwks.json"
|
||||
- "http://{your domain}:8585/api/v1/system/config/jwks"
|
||||
authority: "https://cognito-idp.us-west-1.amazonaws.com/{User Pool ID}"
|
||||
clientId: "{Client ID}"
|
||||
callbackUrl: "http://localhost:8585/callback"
|
||||
|
@ -20,7 +20,7 @@ AUTHORIZER_ADMIN_PRINCIPALS=[admin] # Your `name` from name@domain.com
|
||||
AUTHORIZER_PRINCIPAL_DOMAIN=open-metadata.org # Update with your domain
|
||||
|
||||
AUTHENTICATION_PROVIDER=aws-cognito
|
||||
AUTHENTICATION_PUBLIC_KEYS=[{Cognito Domain}/{User Pool ID}/.well-known/jwks.json] # Update with your Cognito Domain and User Pool ID
|
||||
AUTHENTICATION_PUBLIC_KEYS=[{Cognito Domain}/{User Pool ID}/.well-known/jwks.json, http://{your domain}:8585/api/v1/system/config/jwks] # Update with your Cognito Domain and User Pool ID
|
||||
AUTHENTICATION_AUTHORITY={Cognito Domain}/{User Pool ID} # Update with your Cognito Domain and User Pool ID as follows - https://cognito-idp.us-west-1.amazonaws.com/us-west-1_DL8xfTzj8
|
||||
AUTHENTICATION_CLIENT_ID={Client ID} # Update with your Client ID
|
||||
AUTHENTICATION_CALLBACK_URL=http://localhost:8585/callback
|
||||
|
@ -22,7 +22,7 @@ openmetadata:
|
||||
authentication:
|
||||
provider: "aws-cognito"
|
||||
publicKeys:
|
||||
- "http://openmetadata:8585/api/v1/config/jwks"
|
||||
- "http://{your domain}:8585/api/v1/system/config/jwks"
|
||||
- "{Cognito Domain}/{User Pool ID}/.well-known/jwks.json" # Update with your Cognito Domain and User Pool ID
|
||||
authority: "{Cognito Domain}/{User Pool ID}" # Update with your Cognito Domain and User Pool ID as follows - https://cognito-idp.us-west-1.amazonaws.com/us-west-1_DL8xfTzj8
|
||||
clientId: "{Client ID}" # Update with your Client ID
|
||||
|
@ -14,6 +14,7 @@ authenticationConfiguration:
|
||||
provider: "auth0"
|
||||
publicKeyUrls:
|
||||
- "https://parth-panchal.us.auth0.com/.well-known/jwks.json"
|
||||
- "http://{your domain}:8585/api/v1/system/config/jwks" #Make sure this URL is always configured to enable JWT tokens
|
||||
authority: "https://parth-panchal.us.auth0.com/"
|
||||
clientId: "{Client ID}"
|
||||
callbackUrl: "http://localhost:8585/callback"
|
||||
|
@ -20,7 +20,8 @@ AUTHORIZER_ADMIN_PRINCIPALS=[admin] # Your `name` from name@domain.com
|
||||
AUTHORIZER_PRINCIPAL_DOMAIN=open-metadata.org # Update with your domain
|
||||
|
||||
AUTHENTICATION_PROVIDER=auth0
|
||||
AUTHENTICATION_PUBLIC_KEYS=[{Domain}/.well-known/jwks.json,http://openmetadata:8585/api/v1/config/jwks] # Update with your Domain
|
||||
AUTHENTICATION_PUBLIC_KEYS=[{Domain}/.well-known/jwks.json,http://{your openmetadata domain}/api/v1/config/jwks] # Update with your Domain and Make sure this "/api/v1/config/jwks" is always configured to enable JWT tokens
|
||||
|
||||
AUTHENTICATION_AUTHORITY={Domain} # Update with your Domain
|
||||
AUTHENTICATION_CLIENT_ID={Client ID} # Update with your Client ID
|
||||
AUTHENTICATION_CALLBACK_URL=http://localhost:8585/callback
|
||||
|
@ -22,7 +22,7 @@ openmetadata:
|
||||
authentication:
|
||||
provider: "auth0"
|
||||
publicKeys:
|
||||
- "http://openmetadata:8585/api/v1/config/jwks"
|
||||
- "http://{your openmetadata domain}/api/v1/config/jwks" # Update with your Domain and Make sure this "/api/v1/config/jwks" is always configured to enable JWT tokens
|
||||
- "{Auth0 Domain Name}/.well-known/jwks.json"
|
||||
authority: "https://parth-panchal.us.auth0.com/"
|
||||
clientId: "{Client ID}"
|
||||
|
@ -16,6 +16,7 @@ authenticationConfiguration:
|
||||
provider: "azure"
|
||||
publicKeyUrls:
|
||||
- "https://login.microsoftonline.com/common/discovery/keys"
|
||||
- "http://{your openmetadata domain}/api/v1/config/jwks" # Update with your Domain and Make sure this "/api/v1/config/jwks" is always configured to enable JWT tokens
|
||||
authority: "https://login.microsoftonline.com/{Tenant ID}"
|
||||
clientId: "{Client ID}" # Azure Application
|
||||
callbackUrl: "http://localhost:8585/callback"
|
||||
|
@ -24,7 +24,7 @@ AUTHORIZER_ADMIN_PRINCIPALS=[admin] # Your `name` from name@domain.com
|
||||
AUTHORIZER_PRINCIPAL_DOMAIN=open-metadata.org # Update with your domain
|
||||
|
||||
AUTHENTICATION_PROVIDER=azure
|
||||
AUTHENTICATION_PUBLIC_KEYS=[https://login.microsoftonline.com/common/discovery/keys]
|
||||
AUTHENTICATION_PUBLIC_KEYS=[https://login.microsoftonline.com/common/discovery/keys, http://{your openmetadata domain}/api/v1/config/jwks] # Update with your Domain and Make sure this "/api/v1/config/jwks" is always configured to enable JWT tokens
|
||||
AUTHENTICATION_AUTHORITY=https://login.microsoftonline.com/{Tenant ID} # Update with your Tenant ID
|
||||
AUTHENTICATION_CLIENT_ID={Client ID} # Update with your Client ID of Azure Application
|
||||
AUTHENTICATION_CALLBACK_URL=http://localhost:8585/callback
|
||||
|
@ -26,7 +26,7 @@ openmetadata:
|
||||
authentication:
|
||||
provider: "azure"
|
||||
publicKeys:
|
||||
- "http://openmetadata:8585/api/v1/config/jwks"
|
||||
- "http://{your openmetadata domain}/api/v1/config/jwks" # Update with your Domain and Make sure this "/api/v1/config/jwks" is always configured to enable JWT tokens
|
||||
- "https://login.microsoftonline.com/common/discovery/keys"
|
||||
authority: "https://login.microsoftonline.com/{Tenant ID}"
|
||||
clientId: "{Client ID}" # Azure Application
|
||||
|
@ -35,7 +35,7 @@ The following configuration controls the auth mechanism for OpenMetadata. Update
|
||||
```yaml
|
||||
authenticationConfiguration:
|
||||
provider: ${AUTHENTICATION_PROVIDER:-basic}
|
||||
publicKeyUrls: ${AUTHENTICATION_PUBLIC_KEYS:-[http://localhost:8585/api/v1/system/config/jwks]}
|
||||
publicKeyUrls: ${AUTHENTICATION_PUBLIC_KEYS:-[http://{your openmetadata domain}/api/v1/config/jwks]} # Update with your Domain and Make sure this "/api/v1/config/jwks" is always configured to enable JWT tokens
|
||||
authority: ${AUTHENTICATION_AUTHORITY:-https://accounts.google.com}
|
||||
enableSelfSignup : ${AUTHENTICATION_ENABLE_SELF_SIGNUP:-true}
|
||||
```
|
||||
|
@ -19,6 +19,7 @@ authenticationConfiguration:
|
||||
providerName: "KeyCloak"
|
||||
publicKeyUrls:
|
||||
- "http://localhost:8080/realms/myrealm/protocol/openid-connect/certs"
|
||||
- "http://{your openmetadata domain}/api/v1/config/jwks" # Update with your Domain and Make sure this "/api/v1/config/jwks" is always configured to enable JWT tokens
|
||||
authority: "http://localhost:8080/realms/myrealm"
|
||||
clientId: "{client id}"
|
||||
callbackUrl: "http://localhost:8585/callback"
|
||||
|
@ -21,7 +21,7 @@ AUTHORIZER_PRINCIPAL_DOMAIN=open-metadata.org # Update with your domain
|
||||
|
||||
AUTHENTICATION_PROVIDER=custom-oidc
|
||||
CUSTOM_OIDC_AUTHENTICATION_PROVIDER_NAME=KeyCloak
|
||||
AUTHENTICATION_PUBLIC_KEYS=[{http://localhost:8080/realms/myrealm/protocol/openid-connect/certs}]
|
||||
AUTHENTICATION_PUBLIC_KEYS=[http://localhost:8080/realms/myrealm/protocol/openid-connect/certs, http://{your openmetadata domain}/api/v1/config/jwks] # Update with your Domain and Make sure this "/api/v1/config/jwks" is always configured to enable JWT tokens
|
||||
AUTHENTICATION_AUTHORITY={http://localhost:8080/realms/myrealm}
|
||||
AUTHENTICATION_CLIENT_ID={Client ID} # Update with your Client ID
|
||||
AUTHENTICATION_CALLBACK_URL=http://localhost:8585/callback
|
||||
|
@ -22,7 +22,7 @@ global:
|
||||
authentication:
|
||||
provider: "custom-oidc"
|
||||
publicKeys:
|
||||
- "http://openmetadata:8585/api/v1/config/jwks"
|
||||
- "http://{your openmetadata domain}/api/v1/config/jwks" # Update with your Domain and Make sure this "/api/v1/config/jwks" is always configured to enable JWT tokens
|
||||
- "http://localhost:8080/realms/myrealm/protocol/openid-connect/certs"
|
||||
authority: "http://localhost:8080/realms/myrealm"
|
||||
clientId: "{Client ID}"
|
||||
|
@ -14,6 +14,7 @@ authenticationConfiguration:
|
||||
provider: "google"
|
||||
publicKeyUrls:
|
||||
- "https://www.googleapis.com/oauth2/v3/certs"
|
||||
- "http://{your openmetadata domain}/api/v1/config/jwks" # Update with your Domain and Make sure this "/api/v1/config/jwks" is always configured to enable JWT tokens
|
||||
authority: "https://accounts.google.com"
|
||||
clientId: "{client id}"
|
||||
callbackUrl: "http://localhost:8585/callback"
|
||||
|
@ -21,7 +21,7 @@ AUTHORIZER_INGESTION_PRINCIPALS=[ingestion-bot]
|
||||
AUTHORIZER_PRINCIPAL_DOMAIN=open-metadata.org # Update with your domain
|
||||
|
||||
AUTHENTICATION_PROVIDER=google
|
||||
AUTHENTICATION_PUBLIC_KEYS=[https://www.googleapis.com/oauth2/v3/certs]
|
||||
AUTHENTICATION_PUBLIC_KEYS=[https://www.googleapis.com/oauth2/v3/certs, http://{your openmetadata domain}/api/v1/config/jwks] # Update with your Domain and Make sure this "/api/v1/config/jwks" is always configured to enable JWT tokens
|
||||
AUTHENTICATION_AUTHORITY=https://accounts.google.com
|
||||
AUTHENTICATION_CLIENT_ID={Client ID} # Update with your Google SSO Client ID
|
||||
AUTHENTICATION_CALLBACK_URL=http://localhost:8585/callback
|
||||
|
@ -27,6 +27,7 @@ openmetadata:
|
||||
provider: "google"
|
||||
publicKeys:
|
||||
- "https://www.googleapis.com/oauth2/v3/certs"
|
||||
- "http://{your openmetadata domain}/api/v1/config/jwks" # Update with your Domain and Make sure this "/api/v1/config/jwks" is always configured to enable JWT tokens
|
||||
authority: "https://accounts.google.com"
|
||||
clientId: "{client id}"
|
||||
callbackUrl: "http://localhost:8585/callback"
|
||||
|
@ -20,6 +20,7 @@ authenticationConfiguration:
|
||||
providerName: "KeyCloak"
|
||||
publicKeyUrls:
|
||||
- "http://localhost:8081/auth/realms/data-sec/protocol/openid-connect/certs"
|
||||
- "http://{your openmetadata domain}/api/v1/config/jwks" # Update with your Domain and Make sure this "/api/v1/config/jwks" is always configured to enable JWT tokens
|
||||
authority: "http://localhost:8081/auth/realms/data-sec"
|
||||
clientId: "open-metadata"
|
||||
callbackUrl: "http://localhost:8585/callback"
|
||||
|
@ -23,7 +23,7 @@ AUTHORIZER_PRINCIPAL_DOMAIN=open-metadata.org # Update with your domain
|
||||
|
||||
AUTHENTICATION_PROVIDER=custom-oidc
|
||||
CUSTOM_OIDC_AUTHENTICATION_PROVIDER_NAME=KeyCloak
|
||||
AUTHENTICATION_PUBLIC_KEYS=[{http://localhost:8081/auth/realms/data-sec/protocol/openid-connect/certs}]
|
||||
AUTHENTICATION_PUBLIC_KEYS=[http://localhost:8081/auth/realms/data-sec/protocol/openid-connect/certs, http://{your openmetadata domain}/api/v1/config/jwks] # Update with your Domain and Make sure this "/api/v1/config/jwks" is always configured to enable JWT tokens
|
||||
AUTHENTICATION_AUTHORITY={http://localhost:8081/auth/realms/data-sec}
|
||||
AUTHENTICATION_CLIENT_ID=open-metadata # Update with your Client ID
|
||||
AUTHENTICATION_CALLBACK_URL=http://localhost:8585/callback
|
||||
|
@ -24,7 +24,7 @@ openmetadata:
|
||||
authentication:
|
||||
provider: "custom-oidc"
|
||||
publicKeys:
|
||||
- "http://openmetadata:8585/api/v1/config/jwks"
|
||||
- "http://{your openmetadata domain}/api/v1/config/jwks" # Update with your Domain and Make sure this "/api/v1/config/jwks" is always configured to enable JWT tokens
|
||||
- "http://localhost:8081/auth/realms/data-sec/protocol/openid-connect/certs"
|
||||
authority: "http://localhost:8081/auth/realms/data-sec"
|
||||
clientId: "{Client ID}"
|
||||
|
@ -14,7 +14,7 @@ The following configuration controls the auth mechanism for OpenMetadata. Update
|
||||
```yaml
|
||||
authenticationConfiguration:
|
||||
provider: ${AUTHENTICATION_PROVIDER:-ldap}
|
||||
publicKeyUrls: ${AUTHENTICATION_PUBLIC_KEYS:-[http://localhost:8585/api/v1/system/config/jwks]}
|
||||
publicKeyUrls: ${AUTHENTICATION_PUBLIC_KEYS:-[http://{your openmetadata domain}/api/v1/config/jwks]} # Update with your Domain and Make sure this "/api/v1/config/jwks" is always configured to enable JWT tokens
|
||||
authority: ${AUTHENTICATION_AUTHORITY:-https://accounts.google.com}
|
||||
enableSelfSignup : ${AUTHENTICATION_ENABLE_SELF_SIGNUP:-false}
|
||||
ldapConfiguration:
|
||||
|
@ -14,6 +14,7 @@ authenticationConfiguration:
|
||||
provider: "okta"
|
||||
publicKeyUrls:
|
||||
- "{ISSUER_URL}/v1/keys"
|
||||
- "http://{your openmetadata domain}/api/v1/config/jwks" # Update with your Domain and Make sure this "/api/v1/config/jwks" is always configured to enable JWT tokens
|
||||
authority: "{ISSUER_URL}"
|
||||
clientId: "{CLIENT_ID - SPA APP}"
|
||||
callbackUrl: "http://localhost:8585/callback"
|
||||
|
@ -27,7 +27,7 @@ AUTHORIZER_INGESTION_PRINCIPALS=[ingestion-bot, <service_application_client_id>]
|
||||
AUTHORIZER_PRINCIPAL_DOMAIN=open-metadata.org # Update with your domain
|
||||
|
||||
AUTHENTICATION_PROVIDER=okta
|
||||
AUTHENTICATION_PUBLIC_KEYS={ISSUER_URL}/v1/keys # Update with your Issuer URL
|
||||
AUTHENTICATION_PUBLIC_KEYS=[{ISSUER_URL}/v1/keys, http://{your openmetadata domain}/api/v1/config/jwks] # Update with your Domain and Make sure this "/api/v1/config/jwks" is always configured to enable JWT tokens
|
||||
AUTHENTICATION_AUTHORITY={ISSUER_URL} # Update with your Issuer URL
|
||||
AUTHENTICATION_CLIENT_ID={CLIENT_ID - SPA APP} # Update with your Client ID
|
||||
AUTHENTICATION_CALLBACK_URL=http://localhost:8585/callback
|
||||
|
@ -25,7 +25,7 @@ openmetadata:
|
||||
authentication:
|
||||
provider: "okta"
|
||||
publicKeys:
|
||||
- "http://openmetadata:8585/api/v1/config/jwks"
|
||||
- "http://{your openmetadata domain}/api/v1/config/jwks" # Update with your Domain and Make sure this "/api/v1/config/jwks" is always configured to enable JWT tokens
|
||||
- "{ISSUER_URL}/v1/keys"
|
||||
authority: "{ISSUER_URL}"
|
||||
clientId: "{CLIENT_ID - SPA APP}"
|
||||
|
@ -19,6 +19,7 @@ authenticationConfiguration:
|
||||
providerName: "OneLogin"
|
||||
publicKeyUrls:
|
||||
- "{IssuerUrl}/certs"
|
||||
- "http://{your openmetadata domain}/api/v1/config/jwks" # Update with your Domain and Make sure this "/api/v1/config/jwks" is always configured to enable JWT tokens
|
||||
authority: "{IssuerUrl}"
|
||||
clientId: "{client id}"
|
||||
callbackUrl: "http://localhost:8585/callback"
|
||||
|
@ -20,7 +20,7 @@ AUTHORIZER_ADMIN_PRINCIPALS=[admin] # Your `name` from name@domain.com
|
||||
AUTHORIZER_PRINCIPAL_DOMAIN=open-metadata.org # Update with your domain
|
||||
|
||||
AUTHENTICATION_PROVIDER=custom-oidc
|
||||
AUTHENTICATION_PUBLIC_KEYS={public key url} # Update with your Public Key URL
|
||||
AUTHENTICATION_PUBLIC_KEYS=[{public key url}, http://{your openmetadata domain}/api/v1/config/jwks] # Update with your Domain and Make sure this "/api/v1/config/jwks" is always configured to enable JWT tokens
|
||||
AUTHENTICATION_AUTHORITY={issuer url} # Update with your Issuer URL
|
||||
AUTHENTICATION_CLIENT_ID={Client ID} # Update with your Client ID
|
||||
AUTHENTICATION_CALLBACK_URL=http://localhost:8585/callback
|
||||
|
@ -23,7 +23,7 @@ openmetadata:
|
||||
authentication:
|
||||
provider: "custom-oidc"
|
||||
publicKeys:
|
||||
- "http://openmetadata:8585/api/v1/config/jwks"
|
||||
- "http://{your openmetadata domain}/api/v1/config/jwks" # Update with your Domain and Make sure this "/api/v1/config/jwks" is always configured to enable JWT tokens
|
||||
- "{IssuerUrl}/certs"
|
||||
authority: "{IssuerUrl}"
|
||||
clientId: "{client id}"
|
||||
|
Loading…
x
Reference in New Issue
Block a user