mirror of
				https://github.com/open-metadata/OpenMetadata.git
				synced 2025-10-30 18:17:53 +00:00 
			
		
		
		
	
		
			
				
	
	
		
			40 lines
		
	
	
		
			1.2 KiB
		
	
	
	
		
			Markdown
		
	
	
	
	
	
			
		
		
	
	
			40 lines
		
	
	
		
			1.2 KiB
		
	
	
	
		
			Markdown
		
	
	
	
	
	
| ---
 | |
| title: Custom OIDC SSO for Kubernetes
 | |
| slug: /deployment/security/custom-oidc/kubernetes
 | |
| ---
 | |
| 
 | |
| # Custom OIDC SSO for Kubernetes
 | |
| 
 | |
| Check the Helm information [here](https://artifacthub.io/packages/search?repo=open-metadata).
 | |
| 
 | |
| Once the `Client Id` and `Client Secret` are generated, see the snippet below for an example of where to
 | |
| place the client id value and update the authorizer configurations in the `values.yaml`.
 | |
| 
 | |
| ```yaml
 | |
| global:
 | |
|   authorizer:
 | |
|     className: "org.openmetadata.catalog.security.DefaultAuthorizer"
 | |
|     containerRequestFilter: "org.openmetadata.catalog.security.JwtFilter"
 | |
|     initialAdmins:
 | |
|       - "user1"
 | |
|       - "user2"
 | |
|     botPrincipals:
 | |
|       - "<service_application_client_id>"
 | |
|     principalDomain: "open-metadata.org"
 | |
|   authentication:
 | |
|     provider: "custom-oidc"
 | |
|     publicKeys:
 | |
|       - "http://localhost:8080/realms/myrealm/protocol/openid-connect/certs"
 | |
|     authority: "http://localhost:8080/realms/myrealm"
 | |
|     clientId: "{Client ID}"
 | |
|     callbackUrl: "http://localhost:8585/callback"
 | |
|   airflow:
 | |
|     openmetadata:
 | |
|       authProvider: "custom-oidc"
 | |
|       customOidc:
 | |
|         clientId: ""
 | |
|         # absolute path of secret file on airflow instance
 | |
|         secretKeyPath: ""
 | |
|         tokenEndpoint: ""
 | |
| ```
 | 
