mirror of
https://github.com/open-metadata/OpenMetadata.git
synced 2025-07-13 03:59:45 +00:00

* Prepare Docs V1 structure * Point to the v1.0.0 images dir * Use the same ssh key * Use new key * Add connectors icons * Update images
1.9 KiB
1.9 KiB
title | slug |
---|---|
Custom OIDC SSO for Kubernetes | /deployment/security/custom-oidc/kubernetes |
Custom OIDC SSO for Kubernetes
Check the Helm information here.
Once the Client Id
and Client Secret
are generated, see the snippet below for an example of where to
place the client id value and update the authorizer configurations in the values.yaml
.
Before 0.12.1
global:
authorizer:
className: "org.openmetadata.service.security.DefaultAuthorizer"
containerRequestFilter: "org.openmetadata.service.security.JwtFilter"
initialAdmins:
- "user1"
- "user2"
principalDomain: "open-metadata.org"
authentication:
provider: "custom-oidc"
publicKeys:
- "http://localhost:8080/realms/myrealm/protocol/openid-connect/certs"
authority: "http://localhost:8080/realms/myrealm"
clientId: "{Client ID}"
callbackUrl: "http://localhost:8585/callback"
airflow:
openmetadata:
authProvider: "custom-oidc"
customOidc:
clientId: ""
# absolute path of secret file on airflow instance
secretKey: ""
tokenEndpoint: ""
After 0.12.1
global:
authorizer:
className: "org.openmetadata.service.security.DefaultAuthorizer"
containerRequestFilter: "org.openmetadata.service.security.JwtFilter"
initialAdmins:
- "user1"
- "user2"
principalDomain: "open-metadata.org"
authentication:
provider: "custom-oidc"
publicKeys:
- "http://openmetadata:8585/api/v1/config/jwks"
- "http://localhost:8080/realms/myrealm/protocol/openid-connect/certs"
authority: "http://localhost:8080/realms/myrealm"
clientId: "{Client ID}"
callbackUrl: "http://localhost:8585/callback"
Note: Follow this guide to configure the ingestion-bot
credentials for
ingesting data from Airflow.