miniature-hair-20451
07/17/2023, 6:58 PMbrainy-tent-14503
07/17/2023, 7:43 PMAUTH_OIDC_GROUPS_CLAIM
. So if you create a scope called mygroups
then use AUTH_OIDC_GROUPS_CLAIM=mygroups
also enabling AUTH_OIDC_EXTRACT_GROUPS_ENABLED=true
miniature-hair-20451
07/18/2023, 12:40 PMextraEnvs:
- name: AUTH_OIDC_ENABLED
value: "true"
- name: AUTH_OIDC_CLIENT_ID
value: *.<http://apps.googleusercontent.com|apps.googleusercontent.com>
- name: AUTH_OIDC_CLIENT_SECRET
valueFrom:
secretKeyRef:
name: datahub-oidc-secret
key: client_secret
- name: AUTH_OIDC_JIT_PROVISIONING_ENABLED
value: 'true'
- name: AUTH_OIDC_DISCOVERY_URI
value: <https://accounts.google.com/.well-known/openid-configuration>
- name: AUTH_OIDC_SCOPE
value: "openid profile email <https://www.googleapis.com/auth/admin.directory.group.readonly> <https://www.googleapis.com/auth/admin.directory.user.readonly> <https://www.googleapis.com/auth/admin.directory.group.member.readonly>"
- name: AUTH_OIDC_BASE_URL
value: <https://data-test>.*.xyz
- name: AUTH_OIDC_USER_NAME_CLAIM
value: email
- name: AUTH_OIDC_USER_NAME_CLAIM_REGEX
value: ([^@]+)
- name: AUTH_OIDC_EXTRACT_GROUPS_ENABLED
value: "true"
- name: AUTH_OIDC_GROUPS_CLAIM
value: 'datacatalog.nonprod.admin' or 'groups' or '<mailto:datacatalog.nonprod.admin@company.com|datacatalog.nonprod.admin@company.com>'
brainy-tent-14503
07/18/2023, 9:14 PMgroup
scope/claim. You can still create groups programmatically using DataHub APIs and assign users. The google discovery uri doesn’t include the referenced scopes or claims as supported. I suspect the links you have there are for oauth2 and not oidc.