-
Notifications
You must be signed in to change notification settings - Fork 18
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
See open-metadata/OpenMetadata@d578aa7 from refs/heads/main
- Loading branch information
open-metadata
committed
Dec 18, 2024
1 parent
6d051e5
commit 2c90450
Showing
27 changed files
with
1,542 additions
and
589 deletions.
There are no files selected for viewing
37 changes: 37 additions & 0 deletions
37
content/v1.5.x/deployment/security/auth0/auth-code-flow.md
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,37 @@ | ||
--- | ||
title: Auth0 SSO for Docker | ||
slug: /deployment/security/auth0/auth-code-flow | ||
collate: false | ||
--- | ||
|
||
# Auth Code Flow | ||
|
||
### Step 1: Create a New Application | ||
|
||
- Once you are on the Dashboard page, click on `Applications > Applications` available on the left-hand side panel. | ||
|
||
{% image | ||
src="/images/v1.5/deployment/security/auth0/create-new-app-1.png" | ||
alt="create-app" /%} | ||
|
||
- Click on `Create Application`. | ||
|
||
{% image | ||
src="/images/v1.5/deployment/security/auth0/create-new-app-2.png" | ||
alt="create-app" /%} | ||
|
||
- Enter the Application name. | ||
- Choose an application type and click on `Create`. | ||
|
||
{% image | ||
src="/images/v1.5/deployment/security/auth0/auth-code-flow-1.png" | ||
alt="create-app" /%} | ||
|
||
### Step 2: Where to Find the Credentials | ||
|
||
- Navigate to the Settings tab. | ||
- You will find your `Client ID` and `Client Secret`. | ||
|
||
{% image | ||
src="/images/v1.5/deployment/security/auth0/auth-code-flow-2.png" | ||
alt="credentials" /%} |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,63 @@ | ||
--- | ||
title: Auth0 SSO for Docker | ||
slug: /deployment/security/auth0/implicit-flow | ||
collate: false | ||
--- | ||
|
||
# Implicit Flow | ||
|
||
### Step 1: Create a New Application | ||
|
||
- Once you are on the Dashboard page, click on `Applications > Applications` available on the left-hand side panel. | ||
|
||
{% image | ||
src="/images/v1.5/deployment/security/auth0/create-new-app-1.png" | ||
alt="create-app" /%} | ||
|
||
- Click on `Create Application`. | ||
|
||
{% image | ||
src="/images/v1.5/deployment/security/auth0/create-new-app-2.png" | ||
alt="create-app" /%} | ||
|
||
- Enter the Application name. | ||
- Choose an application type and click on `Create`. | ||
|
||
{% image | ||
src="/images/v1.5/deployment/security/auth0/create-new-app-3.png" | ||
alt="create-app" /%} | ||
|
||
### Step 2: Where to Find the Credentials | ||
|
||
- Navigate to the Settings tab. | ||
- You will find your `Client ID` and `Domain`. | ||
|
||
{% image | ||
src="/images/v1.5/deployment/security/auth0/credentials.png" | ||
alt="credentials" /%} | ||
|
||
After the applying these steps, you can update the configuration of your deployment: | ||
|
||
{% inlineCalloutContainer %} | ||
{% inlineCallout | ||
color="violet-70" | ||
icon="celebration" | ||
bold="Docker Security" | ||
href="/deployment/security/auth0/docker" %} | ||
Configure Auth0 SSO for your Docker Deployment. | ||
{% /inlineCallout %} | ||
{% inlineCallout | ||
color="violet-70" | ||
icon="storage" | ||
bold="Bare Metal Security" | ||
href="/deployment/security/auth0/bare-metal" %} | ||
Configure Auth0 SSO for your Bare Metal Deployment. | ||
{% /inlineCallout %} | ||
{% inlineCallout | ||
color="violet-70" | ||
icon="fit_screen" | ||
bold="Kubernetes Security" | ||
href="/deployment/security/auth0/kubernetes" %} | ||
Configure Auth0 SSO for your Kubernetes Deployment. | ||
{% /inlineCallout %} | ||
{% /inlineCalloutContainer %} |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
45 changes: 45 additions & 0 deletions
45
content/v1.5.x/deployment/security/keycloak/auth-code-flow.md
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,45 @@ | ||
--- | ||
title: Auth code flow of Keyclock | ||
slug: /deployment/security/keycloak/auth-code-flow | ||
collate: false | ||
--- | ||
|
||
# Auth Code Flow | ||
|
||
|
||
### Step 1: Create OpenMetadata as a new Client | ||
- Click on `Clients` in the menu. | ||
- Click on `Create Client` button. | ||
- Select the `Client type`. | ||
- Enter the `Client ID`. | ||
- Enter the Name and Description `(Optional)`. | ||
- Click on `Next` button. | ||
|
||
{% image src="/images/v1.5/deployment/security/keycloak/keycloak-step-3.png" alt="add-client" /%} | ||
|
||
### Step 2: Edit Configs of the client | ||
- Enable `Client authentication` and `Authorization`. | ||
- Select `Standard flow` as an `Authentication flow`. | ||
- Click `Next`. | ||
|
||
{% image src="/images/v1.5/deployment/security/keycloak/keycloak-step-4.png" alt="compatibility configs" /%} | ||
|
||
### Step 3: Add Login Settings | ||
- fill the required options | ||
|
||
{% image src="/images/v1.5/deployment/security/keycloak/keycloak-step-5.png" alt="edit-settings-url.png" /%} | ||
|
||
- Click on `Save` button. | ||
|
||
{% note %} | ||
|
||
Note: Scopes `openid`, `email` & `profile` are required to fetch the user details so you will have to add these scopes in your client. | ||
|
||
{% /note %} | ||
|
||
### Step 3: Where to Find the Credentials | ||
|
||
- Navigate to the `Credentials` tab. | ||
- You will find your `Client Secret` related to the Client id "open-metadata" | ||
|
||
{% image src="/images/v1.5/deployment/security/keycloak/keycloak-step-6.png" alt="client-credentials" /%} |
71 changes: 71 additions & 0 deletions
71
content/v1.5.x/deployment/security/keycloak/implicit-flow.md
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,71 @@ | ||
--- | ||
title: Implicit flow of Keyclock | ||
slug: /deployment/security/keycloak/implicit-flow | ||
collate: false | ||
--- | ||
|
||
# Implicit Flow | ||
|
||
### Step 1: Create OpenMetadata as a new Client | ||
|
||
- Click on `Clients` in the menu. | ||
- Click on `Create Client` button. | ||
- Select the `Client type`. | ||
- Enter the `Client ID`. | ||
- Enter the Name and Description `(Optional)`. | ||
- Click on `Next` button. | ||
|
||
{% image src="/images/v1.5/deployment/security/keycloak/keycloak-step-3.png" alt="add-client" /%} | ||
|
||
### Step 2: Edit Configs of the client | ||
|
||
- Select `Standard flow` and `Implicit flow` as an `Authentication flow`. | ||
- Click `Next`. | ||
|
||
{% image src="/images/v1.5/deployment/security/keycloak/implicit-keycloak-step-4.png" alt="compatibility configs" /%} | ||
|
||
### Step 3: Add Login Settings | ||
- fill the required options | ||
|
||
{% image src="/images/v1.5/deployment/security/keycloak/keycloak-step-5.png" alt="edit-settings-url.png" /%} | ||
|
||
- Click on `Save` button. | ||
|
||
{% note %} | ||
|
||
Note: Scopes `openid`, `email` & `profile` are required to fetch the user details so you will have to add these scopes in your client. | ||
|
||
{% /note %} | ||
|
||
|
||
|
||
|
||
After the applying these steps, the users in your realm are able to login in the openmetadata, as a suggestion create a user called "admin-user". Now you can update the configuration of your deployment: | ||
|
||
{% inlineCalloutContainer %} | ||
{% inlineCallout | ||
color="violet-70" | ||
icon="celebration" | ||
bold="Docker Security" | ||
href="/deployment/security/keycloak/docker" %} | ||
Configure Keycloak SSO for your Docker Deployment. | ||
{% /inlineCallout %} | ||
{% inlineCallout | ||
color="violet-70" | ||
icon="storage" | ||
bold="Bare Metal Security" | ||
href="/deployment/security/keycloak/bare-metal" %} | ||
Configure Keycloak SSO for your Bare Metal Deployment. | ||
{% /inlineCallout %} | ||
{% inlineCallout | ||
color="violet-70" | ||
icon="fit_screen" | ||
bold="Kubernetes Security" | ||
href="/deployment/security/keycloak/kubernetes" %} | ||
Configure Keycloak SSO for your Kubernetes Deployment. | ||
{% /inlineCallout %} | ||
{% /inlineCalloutContainer %} | ||
|
||
{% note %} | ||
A dockerized demo for showing how this SSO works with OpenMetadata can be found [here](https://github.com/open-metadata/openmetadata-demo/tree/main/keycloak-sso). | ||
{% /note %} |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Oops, something went wrong.