few-air-56117
01/19/2022, 11:24 AMsquare-activity-64562
01/19/2022, 11:29 AMfew-air-56117
01/19/2022, 11:32 AMsquare-activity-64562
01/19/2022, 11:33 AMfew-air-56117
01/19/2022, 11:33 AMfew-air-56117
01/19/2022, 12:50 PMInternal server error. The OIDC service responded with an error: 'invalid_client'.
Error description: ': The application ' asked for scope 'groups' that doesn't exist on the resource Contact the app vendor.
few-air-56117
01/19/2022, 12:51 PMAUTH_OIDC_SCOPE="openid profile email groups"
from documentationsquare-activity-64562
01/19/2022, 3:00 PMfew-air-56117
01/19/2022, 3:00 PMfew-air-56117
01/19/2022, 3:01 PMquaint-branch-37931
01/19/2022, 5:41 PMsquare-activity-64562
01/19/2022, 5:43 PMfew-air-56117
01/19/2022, 7:22 PMlittle-megabyte-1074
little-megabyte-1074
few-air-56117
01/19/2022, 7:34 PMlittle-megabyte-1074
few-air-56117
01/19/2022, 7:38 PMfew-air-56117
01/20/2022, 8:14 AMazure_ad_response_to_username_attr: "userPrincipalName"
on recepie.
Its work, but something strange happaning. Now i have 2 users, 1 from ODIC login and 1 from azure db ingestion ( the second one has groups)square-activity-64562
01/20/2022, 8:15 AMfew-air-56117
01/20/2022, 8:17 AMsquare-activity-64562
01/20/2022, 8:19 AMfew-air-56117
01/20/2022, 8:24 AMfew-air-56117
01/20/2022, 8:25 AMfew-air-56117
01/20/2022, 8:25 AMfew-air-56117
01/20/2022, 8:25 AMsquare-activity-64562
01/20/2022, 8:28 AMdragos.c
only. The OIDC one has some incorrect configuration. Can you check OIDC confif to see if these are present or not
AUTH_OIDC_USER_NAME_CLAIM=email
AUTH_OIDC_USER_NAME_CLAIM_REGEX=([^@]+)
few-air-56117
01/20/2022, 8:31 AMfew-air-56117
01/20/2022, 8:31 AMfew-air-56117
01/20/2022, 8:31 AMsquare-activity-64562
01/20/2022, 8:45 AMAUTH_OIDC_USER_NAME_CLAIM_REGEX=([^@]+)
quaint-branch-37931
01/20/2022, 9:14 AMazure_ad_response_to_username_regex: "(.*)"
for the AD ingestionquaint-branch-37931
01/20/2022, 9:44 AMfew-air-56117
01/20/2022, 10:20 AMquaint-branch-37931
01/20/2022, 10:41 AMfew-air-56117
01/20/2022, 10:41 AMplain-lion-38626
01/20/2022, 12:54 PMbig-carpet-38439
01/21/2022, 12:59 AMplain-lion-38626
01/21/2022, 7:15 AMbig-carpet-38439
01/24/2022, 4:28 PMplain-lion-38626
01/25/2022, 7:10 AMsource:
type: "azure-ad"
config:
client_id: "0000000-00000000-000000-00000-000000"
tenant_id: "0000000-00000000-000000-00000-000000"
client_secret: "000000000000000000"
redirect: "<https://login.microsoftonline.com/common/oauth2/nativeclient>"
authority: "<https://login.microsoftonline.com/0000000-00000000-000000-00000-000000>"
token_url: "<https://login.microsoftonline.com/0000000-00000000-000000-00000-000000/oauth2/token>"
graph_url: "<https://graph.microsoft.com/v1.0>"
ingest_users: False
ingest_groups: True
ingest_group_membership: True
ingest_groups_users: True
azure_ad_response_to_username_attr: "userPrincipalName"
azure_ad_response_to_username_regex: "(.*)"
groups_pattern:
allow:
- "<name of group i'm importing>"
users_pattern:
allow:
- ".*"
sink:
type: "datahub-rest"
config:
server: "http://<ip_address>:8080"
modern-monitor-81461
02/15/2022, 12:49 AMgroups
in the scope. The reason it was there is because I never got the groups to work and it was on my to-do list to revisit this... and here I am! I thought it would work like Okta, so I just copied its doc page. I also want to update the Azure doc to explain how to configure the groups
claim in the token configuration page, but before I do so, I want to make it work on my side to make the docs bulletproof. I have verified that the ID token returned by Azure contains the groups
claim, so that's all good. But when I try to load DataHub, I get a 302 Bad Gateway
when the callback is called (see screenshot). I can't see any meaningful error in the frontend logs (both normal and debug logs). Have you guys seen this? Just to be clear, I am not using the Azure AD source to ingest users and groups, I'm simply trying to authenticate a user with the following settings:
- name: AUTH_JAAS_ENABLED
value: "false"
- name: AUTH_OIDC_SCOPE
value: "openid profile email"
- name: AUTH_OIDC_JIT_PROVISIONING_ENABLED
value: "false"
- name: AUTH_OIDC_PRE_PROVISIONING_REQUIRED
value: "false"
- name: AUTH_OIDC_EXTRACT_GROUPS_ENABLED
value: "false"
# Required Configuration Values for OIDC:
- name: AUTH_OIDC_ENABLED
value: "true"
My user already exist in DataHub, so no need to JIT provision it. How did you guys got this to work?