-
Notifications
You must be signed in to change notification settings - Fork 113
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. Weβll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[automate-2530] document supported LDAP/SAML configurations #2636
Changes from all commits
File filter
Filter by extension
Conversations
Jump to
Diff view
Diff view
There are no files selected for viewing
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -15,15 +15,28 @@ We added our own [authn-service](https://github.com/chef/authn-service) as glue | |
|
||
For further questions, the team can be reached at [#auth-team](https://chefio.slack.com/messages/C61F9HHKK/) | ||
|
||
## OpenID Connect aka Dex | ||
## Supported Identity Management Systems | ||
|
||
If you want to use google as an IdP (Identity Provider) or our internal test LDAP server, there are a few variables you can set. | ||
OKTA with SAML and AD with LDAP are the most common configurations among our users. | ||
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more.
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. Oh just also realized this was a dev doc. That's an ignorable nit in that case. |
||
We have also had success with the following configurations: | ||
|
||
To use a test OIDC provider we set up, look for `test oidc provider` on lastpass. Export the value for `Username` as `GOOGLE_CLIENT_ID` and the value for `Password` as `GOOGLE_CLIENT_SECRET`. | ||
### SAML | ||
|
||
For our test ldap server, look up `ldap testhost` and set `LDAP_HOST` to the `Hostname` value. Also look up `ldapbind user` and | ||
set `LDAP_BIND_DN` and `LDAP_BIND_PW` to the values for `Username` and `Password`, respectively. | ||
- OKTA | ||
- Ping | ||
- OneLogin | ||
- Office365 | ||
- Tivoli Federated Identity Manager | ||
|
||
### LDAP | ||
|
||
- Microsoft Active Directory (MSAD) | ||
|
||
### Configurations with Known Issues | ||
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. lets move this section to somewhere in the repo instead of in the docs There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. these are dev docs so they're not part of the docs we deploy to customers. but i could move it to the authn README if that seems a little more out of the way There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. oh lol sorry, ignore me. |
||
|
||
- Azure AD with SAML: we cannot support SAML with Azure AD because Automate cannot consume SAML IdP metadata, which Azure relies on to rotate keys. | ||
- Appleconnect with SAML: invalid signature error. | ||
- In general, dex does not support idP initiated SSO. There is a [PR](https://github.com/dexidp/dex/pull/1514) in progress to add this functionality, last updated Sep 24, 2019. | ||
|
||
## authn-service | ||
|
||
|
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I'm guessing these are in order of prevalence but I expected them to be alphabetized π€·ββ
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
ya alphabetized would look better