docs(okta): Added information about AUTH_OIDC_EXTRACT_GROUPS_ENABLED (#6120)

* Added information about AUTH_OIDC_EXTRACT_GROUPS_ENABLED

* Update configure-oidc-react-okta.md

Co-authored-by: Aditya Radhakrishnan <aditya.radhakrish@gmail.com>
This commit is contained in:
PrashantKhadke 2022-10-04 21:13:14 -07:00 committed by GitHub
parent 164e47a2e9
commit 395d7ea2f5
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23

View File

@ -84,7 +84,7 @@ AUTH_OIDC_SCOPE="openid profile email groups"
Replacing the placeholders above with the client id & client secret received from Okta in Step 2.
> **Pro Tip!** You can easily enable Okta to return the groups that a user is associated with, which will be provisioned in DataHub, along with the user logging in,
> **Pro Tip!** You can easily enable Okta to return the groups that a user is associated with, which will be provisioned in DataHub, along with the user logging in. This can be enabled by setting the `AUTH_OIDC_EXTRACT_GROUPS_ENABLED` flag to `true`.
> if they do not already exist in DataHub. You can enable your Okta application to return a 'groups' claim from the Okta Console at Applications > Your Application -> Sign On -> OpenID Connect ID Token Settings (Requires an edit).
>
> By default, we assume that the groups will appear in a claim named "groups". This can be customized using the `AUTH_OIDC_GROUPS_CLAIM` container configuration.