mirror of
https://github.com/grafana/grafana.git
synced 2025-02-25 18:55:37 -06:00
Docs: remove azure and okta from generic oauth page (#23359)
This commit is contained in:
parent
21f55d1345
commit
2af87b4c6c
@ -54,24 +54,6 @@ Check for the presence of a role using the [JMESPath](http://jmespath.org/exampl
|
|||||||
|
|
||||||
See [JMESPath examples](#jmespath-examples) for more information.
|
See [JMESPath examples](#jmespath-examples) for more information.
|
||||||
|
|
||||||
## Set up OAuth2 with Okta
|
|
||||||
|
|
||||||
First set up Grafana as an OpenId client "webapplication" in Okta. Then set the Base URIs to `https://<grafana domain>/` and set the Login redirect URIs to `https://<grafana domain>/login/generic_oauth`.
|
|
||||||
|
|
||||||
Finally set up the generic oauth module like this:
|
|
||||||
|
|
||||||
```bash
|
|
||||||
[auth.generic_oauth]
|
|
||||||
name = Okta
|
|
||||||
enabled = true
|
|
||||||
scopes = openid profile email
|
|
||||||
client_id = <okta application Client ID>
|
|
||||||
client_secret = <okta application Client Secret>
|
|
||||||
auth_url = https://<okta domain>/oauth2/v1/authorize
|
|
||||||
token_url = https://<okta domain>/oauth2/v1/token
|
|
||||||
api_url = https://<okta domain>/oauth2/v1/userinfo
|
|
||||||
```
|
|
||||||
|
|
||||||
## Set up OAuth2 with Bitbucket
|
## Set up OAuth2 with Bitbucket
|
||||||
|
|
||||||
```bash
|
```bash
|
||||||
@ -150,46 +132,6 @@ allowed_organizations =
|
|||||||
api_url = https://<domain>/userinfo
|
api_url = https://<domain>/userinfo
|
||||||
```
|
```
|
||||||
|
|
||||||
## Set up OAuth2 with Azure Active Directory
|
|
||||||
|
|
||||||
1. Log in to portal.azure.com and click "Azure Active Directory" in the side menu, then click the "Properties" sub-menu item.
|
|
||||||
|
|
||||||
2. Copy the "Directory ID", this is needed for setting URLs later
|
|
||||||
|
|
||||||
3. Click "App Registrations" and add a new application registration:
|
|
||||||
- Name: Grafana
|
|
||||||
- Application type: Web app / API
|
|
||||||
- Sign-on URL: `https://<grafana domain>/login/generic_oauth`
|
|
||||||
|
|
||||||
4. Click the name of the new application to open the application details page.
|
|
||||||
|
|
||||||
5. Note down the "Application ID", this will be the OAuth client id.
|
|
||||||
|
|
||||||
6. Click "Certificates & secrets" and add a new entry under Client secrets
|
|
||||||
- Description: Grafana OAuth
|
|
||||||
- Expires: Never
|
|
||||||
|
|
||||||
7. Click Add then copy the key value, this will be the OAuth client secret.
|
|
||||||
|
|
||||||
8. Configure Grafana as follows:
|
|
||||||
|
|
||||||
```bash
|
|
||||||
[auth.generic_oauth]
|
|
||||||
name = Azure AD
|
|
||||||
enabled = true
|
|
||||||
allow_sign_up = true
|
|
||||||
client_id = <application id>
|
|
||||||
client_secret = <key value>
|
|
||||||
scopes = openid email name
|
|
||||||
auth_url = https://login.microsoftonline.com/<directory id>/oauth2/authorize
|
|
||||||
token_url = https://login.microsoftonline.com/<directory id>/oauth2/token
|
|
||||||
api_url =
|
|
||||||
team_ids =
|
|
||||||
allowed_organizations =
|
|
||||||
```
|
|
||||||
|
|
||||||
> Note: It's important to ensure that the [root_url]({{< relref "../installation/configuration/#root-url" >}}) in Grafana is set in your Azure Application Reply URLs (App -> Settings -> Reply URLs)
|
|
||||||
|
|
||||||
## Set up OAuth2 with Centrify
|
## Set up OAuth2 with Centrify
|
||||||
|
|
||||||
1. Create a new Custom OpenID Connect application configuration in the Centrify dashboard.
|
1. Create a new Custom OpenID Connect application configuration in the Centrify dashboard.
|
||||||
|
Loading…
Reference in New Issue
Block a user