mirror of
https://github.com/open-metadata/OpenMetadata.git
synced 2025-07-12 11:39:39 +00:00

* Prepare Docs V1 structure * Point to the v1.0.0 images dir * Use the same ssh key * Use new key * Add connectors icons * Update images
2.7 KiB
2.7 KiB
title | slug |
---|---|
workflow config auth | /deployment/security/workflow-config-auth |
Workflow Configs for Security Providers
We support different security providers. You can find their definitions here. You can find the different implementation of the ingestion below.
Auth0 SSO
workflowConfig:
openMetadataServerConfig:
hostPort: "http://localhost:8585/api"
authProvider: auth0
securityConfig:
clientId: "{your_client_id}"
secretKey: "{your_client_secret}"
domain: "{your_domain}"
Azure SSO
workflowConfig:
openMetadataServerConfig:
hostPort: "http://localhost:8585/api"
authProvider: azure
securityConfig:
clientSecret: "{your_client_secret}"
authority: "{your_authority_url}"
clientId: "{your_client_id}"
scopes:
- your_scopes
Custom OIDC SSO
workflowConfig:
openMetadataServerConfig:
hostPort: "http://localhost:8585/api"
authProvider: custom-oidc
securityConfig:
clientId: "{your_client_id}"
secretKey: "{your_client_secret}"
domain: "{your_domain}"
Google SSO
workflowConfig:
openMetadataServerConfig:
hostPort: "http://localhost:8585/api"
authProvider: google
securityConfig:
secretKey: "{path-to-json-creds}"
Okta SSO
workflowConfig:
openMetadataServerConfig:
hostPort: http://localhost:8585/api
authProvider: okta
securityConfig:
clientId: "{CLIENT_ID - SPA APP}"
orgURL: "{ISSUER_URL}/v1/token"
privateKey: "{public/private keypair}"
email: "{email}"
scopes:
- token
Amazon Cognito SSO
The ingestion can be configured by Enabling JWT Tokens
workflowConfig:
openMetadataServerConfig:
hostPort: "http://localhost:8585/api"
authProvider: auth0
securityConfig:
clientId: "{your_client_id}"
secretKey: "{your_client_secret}"
domain: "{your_domain}"
OneLogin SSO
Which uses Custom OIDC for the ingestion
workflowConfig:
openMetadataServerConfig:
hostPort: "http://localhost:8585/api"
authProvider: custom-oidc
securityConfig:
clientId: "{your_client_id}"
secretKey: "{your_client_secret}"
domain: "{your_domain}"
KeyCloak SSO
Which uses Custom OIDC for the ingestion
workflowConfig:
openMetadataServerConfig:
hostPort: "http://localhost:8585/api"
authProvider: custom-oidc
securityConfig:
clientId: "{your_client_id}"
secretKey: "{your_client_secret}"
domain: "{your_domain}"