Skip to content

Commit

Permalink
docs(sso) move root user warning to earlier in SSO guides (#7028)
Browse files Browse the repository at this point in the history
  • Loading branch information
maggiehays authored Jan 13, 2023
1 parent 7c60659 commit 8e92071
Show file tree
Hide file tree
Showing 4 changed files with 29 additions and 8 deletions.
7 changes: 7 additions & 0 deletions docs/authentication/guides/sso/configure-oidc-react-azure.md
Original file line number Diff line number Diff line change
Expand Up @@ -6,6 +6,13 @@ delegate authentication responsibility to identity providers like Microsoft Azur

This guide will provide steps for configuring DataHub authentication using Microsoft Azure.

:::caution
Even when OIDC is configured, the root user can still login without OIDC by going
to `/login` URL endpoint. It is recommended that you don't use the default
credentials by mounting a different file in the front end container. To do this
please see [this guide](../jaas.md) to mount a custom user.props file for a JAAS authenticated deployment.
:::

## Steps

### 1. Create an application registration in Microsoft Azure portal
Expand Down
7 changes: 7 additions & 0 deletions docs/authentication/guides/sso/configure-oidc-react-google.md
Original file line number Diff line number Diff line change
Expand Up @@ -6,6 +6,13 @@ authentication responsibility to identity providers like Google.

This guide will provide steps for configuring DataHub authentication using Google.

:::caution
Even when OIDC is configured, the root user can still login without OIDC by going
to `/login` URL endpoint. It is recommended that you don't use the default
credentials by mounting a different file in the front end container. To do this
please see [this guide](../jaas.md) to mount a custom user.props file for a JAAS authenticated deployment.
:::

## Steps

### 1. Create a project in the Google API Console
Expand Down
7 changes: 7 additions & 0 deletions docs/authentication/guides/sso/configure-oidc-react-okta.md
Original file line number Diff line number Diff line change
Expand Up @@ -6,6 +6,13 @@ delegate authentication responsibility to identity providers like Okta.

This guide will provide steps for configuring DataHub authentication using Okta.

:::caution
Even when OIDC is configured, the root user can still login without OIDC by going
to `/login` URL endpoint. It is recommended that you don't use the default
credentials by mounting a different file in the front end container. To do this
please see [this guide](../jaas.md) to mount a custom user.props file for a JAAS authenticated deployment.
:::

## Steps

### 1. Create an application in Okta Developer Console
Expand Down
16 changes: 8 additions & 8 deletions docs/authentication/guides/sso/configure-oidc-react.md
Original file line number Diff line number Diff line change
Expand Up @@ -6,6 +6,13 @@ This enables operators of DataHub to integrate with 3rd party identity providers
When configured, OIDC auth will be enabled between clients of the DataHub UI & `datahub-frontend` server. Beyond this point is considered
to be a secure environment and as such authentication is validated & enforced only at the "front door" inside datahub-frontend.

:::caution
Even if OIDC is configured the root user can still login without OIDC by going
to `/login` URL endpoint. It is recommended that you don't use the default
credentials by mounting a different file in the front end container. To do this
please see [this guide](../jaas.md) to mount a custom user.props file for a JAAS authenticated deployment.
:::

## Provider-Specific Guides

1. [Configuring OIDC using Google](configure-oidc-react-google.md)
Expand Down Expand Up @@ -181,11 +188,4 @@ A brief summary of the steps that occur when the user navigates to the React app
can be used to retrieve information on behalf of the authenticated user
6. DataHub fetches the authenticated user's profile and extracts a username to identify the user on DataHub (eg. urn:li:corpuser:username)
7. DataHub sets session cookies for the newly authenticated user
8. DataHub redirects the user to the homepage ("/")
### Root user
Even if OIDC is configured the root user can still login without OIDC by going
to `/login` URL endpoint. It is recommended that you don't use the default
credentials by mounting a different file in the front end container. To do this
please see how to mount a custom user.props file for a JAAS authenticated deployment.
8. DataHub redirects the user to the homepage ("/")

0 comments on commit 8e92071

Please sign in to comment.