diff --git a/configuration/authentication/oauth2.md b/configuration/authentication/oauth2.md index 8aaf658..307c6f0 100644 --- a/configuration/authentication/oauth2.md +++ b/configuration/authentication/oauth2.md @@ -210,3 +210,26 @@ auth: custom-params: type: keycloak ``` + +### GoAuthentic + +```yaml +auth: + type: OAUTH2 + oauth2: + client: + goauthentic: + provider: goauthentic + clientId: xxx + clientSecret: yyy + scope: [ 'openid', 'profile', 'email' ] + client-name: goauthentic + issuer-uri: https:///application/o// + user-name-attribute: nickname # OR "name", "given_name", "email", "preferred_username" + redirect-uri: http://localhost:8080/login/oauth2/code/oauth2 + authorization-grant-type: authorization_code + custom-params: + type: oauth + roles-field: groups + logoutUrl: https:///application/o//end-session/ +``` \ No newline at end of file diff --git a/configuration/rbac-role-based-access-control/supported-identity-providers.md b/configuration/rbac-role-based-access-control/supported-identity-providers.md index b6fdf84..35fef5d 100644 --- a/configuration/rbac-role-based-access-control/supported-identity-providers.md +++ b/configuration/rbac-role-based-access-control/supported-identity-providers.md @@ -82,7 +82,7 @@ Not yet supported, see [Issue 3741](https://github.com/provectus/kafka-ui/issues You can map Okta Groups to roles. First, confirm that your okta administrator has included the `group` claim or the groups will not be passed in the auth token. -Ensure `roles-field` in the auth config is set to `groups` and that `groups` is included in the `scope`, see [here](../authentication/oauth2.md###Okta) for more details. +Ensure `roles-field` in the auth config is set to `groups` and that `groups` is included in the `scope`, see [here](../authentication/oauth2.md#okta) for more details. Configure the role mapping to the okta group via generic provider mentioned above: @@ -92,3 +92,18 @@ Configure the role mapping to the okta group via generic provider mentioned abov type: role value: "" ``` + +### GoAuthentic + +You can map GoAuthentic Groups to roles. First, confirm that your GoAuthentic administrator has included the `profile` claim or the groups will not be passed in the auth token. + +Ensure `roles-field` in the auth config is set to `groups` and that `profile` is included in the `scope`, as groups are passed by default in the profile scope. See [here](../authentication/oauth2.md#goauthentic) for more details. + +Configure the role mapping to the GoAuthentic group via generic provider mentioned above: + +```yaml + subjects: + - provider: oauth + type: role + value: "" +``` \ No newline at end of file