Hi everyone, I'm trying to add Azure SSO to my dat...
# troubleshoot
a
Hi everyone, I'm trying to add Azure SSO to my datahub quickstart but the redirect is failing. The docker instance is running on a RHEL VM that I ssh into so to access the datahub frontend from my local machine browser, its http://vm-ipaddress:9002/ . I followed the Azure SSO guide and added all of the correct env variables to my docker compose file. When i click "sign in with SSO" on the login page, it does go to the AUTH_ OIDC_DISCOVERY_URL successfully but since AUTH_OIDC_BASE_URL is set to localhost:9002 it fails at the callback/oidc. The docker instance is not actually running on my local machine so there no datahub frontend at localhost:9002. I tried having the AUTH_OIDC_BASE_URL include the IP address but it didn't work. I also tried adding the direct ip address as one of the Redirect URLs in the Azure App Registration but that didn't work either. Is there anyway I can get around this to get the SSO to work?
1
b
hey Fleurevca! so you tried changing AUTH_OIDC_BASE_URL from localhost:9002 to your hosted frontend url and it didn't work? or you just changed BASE_URL?
a
yeah AUTH_OIDC_BASE_URL
b
hm that's weird because I believe we use that env variable to construct the proper callback url after authentication, and above your screenshot shows that we're redirecting you to localhost:9002. when you change
AUTH_OIDC_BASE_URL
are you restarting your frontend container to ensure that env variable is set properly?
b
What error shows up if you put the IP address:9002 as base_url?
a
hey, sorry for the late reply but yes, i am restarting the container. i run
docker compose -p datahub -f composefile.yml down
each time to do that. the first screenshot is the error i get when i have base_url as IP_Address:9002. the second one is when i try to add it as a redierct uri in the azure portal.
b
seems like a common limitation for IdP providers... they expect HTTPS connection if the app instance is not localhost.
i'm not familiar with securing access for docker-compose deployments, sorry im using k8s ingress with cert manager that provides TLS certs