mirror of
https://github.com/datahub-project/datahub.git
synced 2025-12-04 06:33:05 +00:00
docs(okta): Added information about AUTH_OIDC_EXTRACT_GROUPS_ENABLED (#6120)
* Added information about AUTH_OIDC_EXTRACT_GROUPS_ENABLED * Update configure-oidc-react-okta.md Co-authored-by: Aditya Radhakrishnan <aditya.radhakrish@gmail.com>
This commit is contained in:
parent
164e47a2e9
commit
395d7ea2f5
@ -84,7 +84,7 @@ AUTH_OIDC_SCOPE="openid profile email groups"
|
||||
|
||||
Replacing the placeholders above with the client id & client secret received from Okta in Step 2.
|
||||
|
||||
> **Pro Tip!** You can easily enable Okta to return the groups that a user is associated with, which will be provisioned in DataHub, along with the user logging in,
|
||||
> **Pro Tip!** You can easily enable Okta to return the groups that a user is associated with, which will be provisioned in DataHub, along with the user logging in. This can be enabled by setting the `AUTH_OIDC_EXTRACT_GROUPS_ENABLED` flag to `true`.
|
||||
> if they do not already exist in DataHub. You can enable your Okta application to return a 'groups' claim from the Okta Console at Applications > Your Application -> Sign On -> OpenID Connect ID Token Settings (Requires an edit).
|
||||
>
|
||||
> By default, we assume that the groups will appear in a claim named "groups". This can be customized using the `AUTH_OIDC_GROUPS_CLAIM` container configuration.
|
||||
|
||||
Loading…
x
Reference in New Issue
Block a user