Custom OIDC SSO for Bare Metal
Update conf/openmetadata.yaml
Once the Client Id
is generated, add the Client Id
in openmetadata.yaml
file in client_id
field.
Update the providerName
config to the name you want to display in the Sign In
button in the UI. For example, with the following configuration with providerName
set to KeyCloak
, the users will see Sign In with KeyCloak SSO
in the Sign In
page of the OpenMetadata UI.
AUTHENTICATION_PUBLIC_KEYS
and AUTHENTICATION_CALLBACK_URL
refers to https://{your domain} this is referring to your OpenMetdata installation domain name and please make sure to correctly put http or https depending on your installation.
Then,
- Update
authorizerConfiguration
to add login names of the admin users inadminPrincipals
section as shown below. - Update the
principalDomain
to your company domain name.
Configure Ingestion
Once your server security is set, it's time to review the ingestion configuration. Our bots support JWT tokens to authenticate to the server when sending requests.
Find more information on Enabling JWT Tokens and JWT Troubleshooting to ensure seamless authentication.
Troubleshooting
- If you are seeing the below trace in the logs, you need to add the discovery URL
To resolve the error regarding the discovery URL, you need to set the AUTHENTICATION_DISCOVERY_URI
in your configuration. This URI is used to discover the OpenID Connect provider's configuration.