docs/authentication/guides/sso/initialize-oidc.md
This guide will walk you through the following steps with your identity provider:
Choose your identity provider to get started:
Using an account linked to your organization, navigate to the Google API Console and select New project.
Within this project, we will configure the OAuth2.0 screen and credentials.
<p align="center"> </p>Navigate to OAuth consent screen. This is where you'll configure the screen your users see when attempting to log in to DataHub. Select Internal (if you only want your company users to have access) and then click Create.
<p align="center"> </p>Note that in order to complete this step you should be logged into a Google account associated with your organization.
Fill out the details in the App Information & Domain sections. Make sure the 'Application Home Page' provided matches where DataHub is deployed at your organization.
<p align="center"> </p>Once you've completed this, Save & Continue.
Next, click Add or Remove Scopes. Select the following scopes and click Save & Continue.
.../auth/userinfo.email.../auth/userinfo.profileopenidThe following steps will walk you through generating a Client ID and Client Secret.
https://your-datahub-domain.com./callback/oidc appended, i.e. https://your-datahub-domain.com/callback/oidc.This will generate a Client ID and Client Secret:
<p align="center"> </p>You will need these values in the next step, in addition to the following Discovery URI:
https://accounts.google.com/.well-known/openid-configuration`
Log in to your Okta admin account and navigate to the developer console. From there:
Under General Settings, provide a name for your application and configure the following URIs:
https://your-datahub-domain.com/callback/oidchttps://your-datahub-domain.com/loginIf you plan to enable DataHub login as an Okta tile, configure the Initiate Login URI:
https://your-datahub-domain.com/authenticatehttp://localhost:9002After registering your app, navigate to the General tab to find the following Client Credential values:
You will need these values in the next step, in addition to the following Discovery URI:
https://your-okta-domain.com/.well-known/openid-configuration
Using an account linked to your organization, navigate to the Microsoft Azure Portal. From there:
https://your-datahub-domain.com/callback/oidc. NOTE: You can add more later.Once registration is complete, you will need to configure the Logout URL, which is required for SSO to work correctly.
https://your-datahub-domain.com/login.http://localhost:9002/callback/oidc for local testing.You are now ready to create and configure client credentials:
Value to be used as the Client Secret in DataHub SSO configuration; Azure will not display this again.Next, you will configure the appropriate API permissions to enable SSO with DataHub.
User.ReadprofileemailopenidNow that you have registered your app, generated a client secret, and configured the appropriate permissions, you are now ready to enable Azure AD SSO with DataHub.
You will need the following values in the next step:
Value in the Client secret you created, above. This will map to Client Secret in DataHub.https://login.microsoftonline.com/{tenant ID}/v2.0/.well-known/openid-configuration.Once you have your Client ID, Client Secret, and Discovery URI, you may proceed with next steps.
If you're deployed with DataHub Cloud, you can enable OIDC SSO with a few clicks. 👉 See the guide here.
If you're self-deployed with DataHub Core, you'll need to configure your frontend server within your deployment environment. 👉 See the guide here.