From ec32d9c573e545afa91d9c154b56d4e850382b0e Mon Sep 17 00:00:00 2001 From: Akash Jain <15995028+akash-jain-10@users.noreply.github.com> Date: Fri, 5 Jan 2024 17:30:17 +0530 Subject: [PATCH] docs: Fix documented API Endpoint url for PublicKeys (#14594) --- .../content/v1.2.x/deployment/security/auth0/docker.md | 2 +- .../content/v1.2.x/deployment/security/auth0/kubernetes.md | 2 +- .../content/v1.2.x/deployment/security/azure/bare-metal.md | 2 +- .../content/v1.2.x/deployment/security/azure/docker.md | 2 +- .../content/v1.2.x/deployment/security/azure/kubernetes.md | 2 +- .../content/v1.2.x/deployment/security/basic-auth/index.md | 2 +- .../v1.2.x/deployment/security/custom-oidc/bare-metal.md | 2 +- .../content/v1.2.x/deployment/security/custom-oidc/docker.md | 2 +- .../v1.2.x/deployment/security/custom-oidc/kubernetes.md | 2 +- .../content/v1.2.x/deployment/security/google/bare-metal.md | 2 +- .../content/v1.2.x/deployment/security/google/docker.md | 2 +- .../content/v1.2.x/deployment/security/google/kubernetes.md | 2 +- .../content/v1.2.x/deployment/security/keycloak/bare-metal.md | 2 +- .../content/v1.2.x/deployment/security/keycloak/docker.md | 2 +- .../content/v1.2.x/deployment/security/keycloak/kubernetes.md | 2 +- .../content/v1.2.x/deployment/security/ldap/bare-metal.md | 2 +- .../content/v1.2.x/deployment/security/okta/bare-metal.md | 2 +- .../content/v1.2.x/deployment/security/okta/docker.md | 2 +- .../content/v1.2.x/deployment/security/okta/kubernetes.md | 2 +- .../content/v1.2.x/deployment/security/one-login/bare-metal.md | 2 +- .../content/v1.2.x/deployment/security/one-login/docker.md | 2 +- .../content/v1.2.x/deployment/security/one-login/kubernetes.md | 2 +- 22 files changed, 22 insertions(+), 22 deletions(-) diff --git a/openmetadata-docs/content/v1.2.x/deployment/security/auth0/docker.md b/openmetadata-docs/content/v1.2.x/deployment/security/auth0/docker.md index bcf775e7eb2f..576f76428eff 100644 --- a/openmetadata-docs/content/v1.2.x/deployment/security/auth0/docker.md +++ b/openmetadata-docs/content/v1.2.x/deployment/security/auth0/docker.md @@ -20,7 +20,7 @@ AUTHORIZER_ADMIN_PRINCIPALS=[admin] # Your `name` from name@domain.com AUTHORIZER_PRINCIPAL_DOMAIN=open-metadata.org # Update with your domain AUTHENTICATION_PROVIDER=auth0 -AUTHENTICATION_PUBLIC_KEYS=[{Domain}/.well-known/jwks.json,http://{your openmetadata domain}/api/v1/config/jwks] # Update with your Domain and Make sure this "/api/v1/config/jwks" is always configured to enable JWT tokens +AUTHENTICATION_PUBLIC_KEYS=[{Domain}/.well-known/jwks.json,http://{your openmetadata domain}/api/v1/system/config/jwks] # Update with your Domain and Make sure this "/api/v1/system/config/jwks" is always configured to enable JWT tokens AUTHENTICATION_AUTHORITY={Domain} # Update with your Domain AUTHENTICATION_CLIENT_ID={Client ID} # Update with your Client ID diff --git a/openmetadata-docs/content/v1.2.x/deployment/security/auth0/kubernetes.md b/openmetadata-docs/content/v1.2.x/deployment/security/auth0/kubernetes.md index 187c75ef6212..dfd35d1df6d3 100644 --- a/openmetadata-docs/content/v1.2.x/deployment/security/auth0/kubernetes.md +++ b/openmetadata-docs/content/v1.2.x/deployment/security/auth0/kubernetes.md @@ -22,7 +22,7 @@ openmetadata: authentication: provider: "auth0" publicKeys: - - "http://{your openmetadata domain}/api/v1/config/jwks" # Update with your Domain and Make sure this "/api/v1/config/jwks" is always configured to enable JWT tokens + - "http://{your openmetadata domain}/api/v1/system/config/jwks" # Update with your Domain and Make sure this "/api/v1/system/config/jwks" is always configured to enable JWT tokens - "{Auth0 Domain Name}/.well-known/jwks.json" authority: "https://parth-panchal.us.auth0.com/" clientId: "{Client ID}" diff --git a/openmetadata-docs/content/v1.2.x/deployment/security/azure/bare-metal.md b/openmetadata-docs/content/v1.2.x/deployment/security/azure/bare-metal.md index ee5fd956e6f3..88d16cf358a7 100644 --- a/openmetadata-docs/content/v1.2.x/deployment/security/azure/bare-metal.md +++ b/openmetadata-docs/content/v1.2.x/deployment/security/azure/bare-metal.md @@ -16,7 +16,7 @@ authenticationConfiguration: provider: "azure" publicKeyUrls: - "https://login.microsoftonline.com/common/discovery/keys" - - "http://{your openmetadata domain}/api/v1/config/jwks" # Update with your Domain and Make sure this "/api/v1/config/jwks" is always configured to enable JWT tokens + - "http://{your openmetadata domain}/api/v1/system/config/jwks" # Update with your Domain and Make sure this "/api/v1/system/config/jwks" is always configured to enable JWT tokens authority: "https://login.microsoftonline.com/{Tenant ID}" clientId: "{Client ID}" # Azure Application callbackUrl: "http://localhost:8585/callback" diff --git a/openmetadata-docs/content/v1.2.x/deployment/security/azure/docker.md b/openmetadata-docs/content/v1.2.x/deployment/security/azure/docker.md index cf522418df56..d64bd1f66548 100644 --- a/openmetadata-docs/content/v1.2.x/deployment/security/azure/docker.md +++ b/openmetadata-docs/content/v1.2.x/deployment/security/azure/docker.md @@ -24,7 +24,7 @@ AUTHORIZER_ADMIN_PRINCIPALS=[admin] # Your `name` from name@domain.com AUTHORIZER_PRINCIPAL_DOMAIN=open-metadata.org # Update with your domain AUTHENTICATION_PROVIDER=azure -AUTHENTICATION_PUBLIC_KEYS=[https://login.microsoftonline.com/common/discovery/keys, http://{your openmetadata domain}/api/v1/config/jwks] # Update with your Domain and Make sure this "/api/v1/config/jwks" is always configured to enable JWT tokens +AUTHENTICATION_PUBLIC_KEYS=[https://login.microsoftonline.com/common/discovery/keys, http://{your openmetadata domain}/api/v1/system/config/jwks] # Update with your Domain and Make sure this "/api/v1/system/config/jwks" is always configured to enable JWT tokens AUTHENTICATION_AUTHORITY=https://login.microsoftonline.com/{Tenant ID} # Update with your Tenant ID AUTHENTICATION_CLIENT_ID={Client ID} # Update with your Client ID of Azure Application AUTHENTICATION_CALLBACK_URL=http://localhost:8585/callback diff --git a/openmetadata-docs/content/v1.2.x/deployment/security/azure/kubernetes.md b/openmetadata-docs/content/v1.2.x/deployment/security/azure/kubernetes.md index 834d11ebeea0..61d7065ce32d 100644 --- a/openmetadata-docs/content/v1.2.x/deployment/security/azure/kubernetes.md +++ b/openmetadata-docs/content/v1.2.x/deployment/security/azure/kubernetes.md @@ -26,7 +26,7 @@ openmetadata: authentication: provider: "azure" publicKeys: - - "http://{your openmetadata domain}/api/v1/config/jwks" # Update with your Domain and Make sure this "/api/v1/config/jwks" is always configured to enable JWT tokens + - "http://{your openmetadata domain}/api/v1/system/config/jwks" # Update with your Domain and Make sure this "/api/v1/system/config/jwks" is always configured to enable JWT tokens - "https://login.microsoftonline.com/common/discovery/keys" authority: "https://login.microsoftonline.com/{Tenant ID}" clientId: "{Client ID}" # Azure Application diff --git a/openmetadata-docs/content/v1.2.x/deployment/security/basic-auth/index.md b/openmetadata-docs/content/v1.2.x/deployment/security/basic-auth/index.md index 5bcc4c048ba0..a6e53c74e408 100644 --- a/openmetadata-docs/content/v1.2.x/deployment/security/basic-auth/index.md +++ b/openmetadata-docs/content/v1.2.x/deployment/security/basic-auth/index.md @@ -35,7 +35,7 @@ The following configuration controls the auth mechanism for OpenMetadata. Update ```yaml authenticationConfiguration: provider: ${AUTHENTICATION_PROVIDER:-basic} - publicKeyUrls: ${AUTHENTICATION_PUBLIC_KEYS:-[http://{your openmetadata domain}/api/v1/config/jwks]} # Update with your Domain and Make sure this "/api/v1/config/jwks" is always configured to enable JWT tokens + publicKeyUrls: ${AUTHENTICATION_PUBLIC_KEYS:-[http://{your openmetadata domain}/api/v1/system/config/jwks]} # Update with your Domain and Make sure this "/api/v1/system/config/jwks" is always configured to enable JWT tokens authority: ${AUTHENTICATION_AUTHORITY:-https://accounts.google.com} enableSelfSignup : ${AUTHENTICATION_ENABLE_SELF_SIGNUP:-true} ``` diff --git a/openmetadata-docs/content/v1.2.x/deployment/security/custom-oidc/bare-metal.md b/openmetadata-docs/content/v1.2.x/deployment/security/custom-oidc/bare-metal.md index 82b9058f3842..b69844731d53 100644 --- a/openmetadata-docs/content/v1.2.x/deployment/security/custom-oidc/bare-metal.md +++ b/openmetadata-docs/content/v1.2.x/deployment/security/custom-oidc/bare-metal.md @@ -19,7 +19,7 @@ authenticationConfiguration: providerName: "KeyCloak" publicKeyUrls: - "http://localhost:8080/realms/myrealm/protocol/openid-connect/certs" - - "http://{your openmetadata domain}/api/v1/config/jwks" # Update with your Domain and Make sure this "/api/v1/config/jwks" is always configured to enable JWT tokens + - "http://{your openmetadata domain}/api/v1/system/config/jwks" # Update with your Domain and Make sure this "/api/v1/system/config/jwks" is always configured to enable JWT tokens authority: "http://localhost:8080/realms/myrealm" clientId: "{client id}" callbackUrl: "http://localhost:8585/callback" diff --git a/openmetadata-docs/content/v1.2.x/deployment/security/custom-oidc/docker.md b/openmetadata-docs/content/v1.2.x/deployment/security/custom-oidc/docker.md index 578f5c24cef9..fa0a04de1d47 100644 --- a/openmetadata-docs/content/v1.2.x/deployment/security/custom-oidc/docker.md +++ b/openmetadata-docs/content/v1.2.x/deployment/security/custom-oidc/docker.md @@ -21,7 +21,7 @@ AUTHORIZER_PRINCIPAL_DOMAIN=open-metadata.org # Update with your domain AUTHENTICATION_PROVIDER=custom-oidc CUSTOM_OIDC_AUTHENTICATION_PROVIDER_NAME=KeyCloak -AUTHENTICATION_PUBLIC_KEYS=[http://localhost:8080/realms/myrealm/protocol/openid-connect/certs, http://{your openmetadata domain}/api/v1/config/jwks] # Update with your Domain and Make sure this "/api/v1/config/jwks" is always configured to enable JWT tokens +AUTHENTICATION_PUBLIC_KEYS=[http://localhost:8080/realms/myrealm/protocol/openid-connect/certs, http://{your openmetadata domain}/api/v1/system/config/jwks] # Update with your Domain and Make sure this "/api/v1/system/config/jwks" is always configured to enable JWT tokens AUTHENTICATION_AUTHORITY={http://localhost:8080/realms/myrealm} AUTHENTICATION_CLIENT_ID={Client ID} # Update with your Client ID AUTHENTICATION_CALLBACK_URL=http://localhost:8585/callback diff --git a/openmetadata-docs/content/v1.2.x/deployment/security/custom-oidc/kubernetes.md b/openmetadata-docs/content/v1.2.x/deployment/security/custom-oidc/kubernetes.md index bc9cba5aa8ab..e76bed13e8d1 100644 --- a/openmetadata-docs/content/v1.2.x/deployment/security/custom-oidc/kubernetes.md +++ b/openmetadata-docs/content/v1.2.x/deployment/security/custom-oidc/kubernetes.md @@ -22,7 +22,7 @@ global: authentication: provider: "custom-oidc" publicKeys: - - "http://{your openmetadata domain}/api/v1/config/jwks" # Update with your Domain and Make sure this "/api/v1/config/jwks" is always configured to enable JWT tokens + - "http://{your openmetadata domain}/api/v1/system/config/jwks" # Update with your Domain and Make sure this "/api/v1/system/config/jwks" is always configured to enable JWT tokens - "http://localhost:8080/realms/myrealm/protocol/openid-connect/certs" authority: "http://localhost:8080/realms/myrealm" clientId: "{Client ID}" diff --git a/openmetadata-docs/content/v1.2.x/deployment/security/google/bare-metal.md b/openmetadata-docs/content/v1.2.x/deployment/security/google/bare-metal.md index af7073030097..58221c2efd44 100644 --- a/openmetadata-docs/content/v1.2.x/deployment/security/google/bare-metal.md +++ b/openmetadata-docs/content/v1.2.x/deployment/security/google/bare-metal.md @@ -14,7 +14,7 @@ authenticationConfiguration: provider: "google" publicKeyUrls: - "https://www.googleapis.com/oauth2/v3/certs" - - "http://{your openmetadata domain}/api/v1/config/jwks" # Update with your Domain and Make sure this "/api/v1/config/jwks" is always configured to enable JWT tokens + - "http://{your openmetadata domain}/api/v1/system/config/jwks" # Update with your Domain and Make sure this "/api/v1/system/config/jwks" is always configured to enable JWT tokens authority: "https://accounts.google.com" clientId: "{client id}" callbackUrl: "http://localhost:8585/callback" diff --git a/openmetadata-docs/content/v1.2.x/deployment/security/google/docker.md b/openmetadata-docs/content/v1.2.x/deployment/security/google/docker.md index 78a35eefbad4..ba6e728eb687 100644 --- a/openmetadata-docs/content/v1.2.x/deployment/security/google/docker.md +++ b/openmetadata-docs/content/v1.2.x/deployment/security/google/docker.md @@ -21,7 +21,7 @@ AUTHORIZER_INGESTION_PRINCIPALS=[ingestion-bot] AUTHORIZER_PRINCIPAL_DOMAIN=open-metadata.org # Update with your domain AUTHENTICATION_PROVIDER=google -AUTHENTICATION_PUBLIC_KEYS=[https://www.googleapis.com/oauth2/v3/certs, http://{your openmetadata domain}/api/v1/config/jwks] # Update with your Domain and Make sure this "/api/v1/config/jwks" is always configured to enable JWT tokens +AUTHENTICATION_PUBLIC_KEYS=[https://www.googleapis.com/oauth2/v3/certs, http://{your openmetadata domain}/api/v1/system/config/jwks] # Update with your Domain and Make sure this "/api/v1/system/config/jwks" is always configured to enable JWT tokens AUTHENTICATION_AUTHORITY=https://accounts.google.com AUTHENTICATION_CLIENT_ID={Client ID} # Update with your Google SSO Client ID AUTHENTICATION_CALLBACK_URL=http://localhost:8585/callback diff --git a/openmetadata-docs/content/v1.2.x/deployment/security/google/kubernetes.md b/openmetadata-docs/content/v1.2.x/deployment/security/google/kubernetes.md index a3176ef98235..2d49900c5bde 100644 --- a/openmetadata-docs/content/v1.2.x/deployment/security/google/kubernetes.md +++ b/openmetadata-docs/content/v1.2.x/deployment/security/google/kubernetes.md @@ -27,7 +27,7 @@ openmetadata: provider: "google" publicKeys: - "https://www.googleapis.com/oauth2/v3/certs" - - "http://{your openmetadata domain}/api/v1/config/jwks" # Update with your Domain and Make sure this "/api/v1/config/jwks" is always configured to enable JWT tokens + - "http://{your openmetadata domain}/api/v1/system/config/jwks" # Update with your Domain and Make sure this "/api/v1/system/config/jwks" is always configured to enable JWT tokens authority: "https://accounts.google.com" clientId: "{client id}" callbackUrl: "http://localhost:8585/callback" diff --git a/openmetadata-docs/content/v1.2.x/deployment/security/keycloak/bare-metal.md b/openmetadata-docs/content/v1.2.x/deployment/security/keycloak/bare-metal.md index b4da663dfd08..fa6f15e31a06 100644 --- a/openmetadata-docs/content/v1.2.x/deployment/security/keycloak/bare-metal.md +++ b/openmetadata-docs/content/v1.2.x/deployment/security/keycloak/bare-metal.md @@ -20,7 +20,7 @@ authenticationConfiguration: providerName: "KeyCloak" publicKeyUrls: - "http://localhost:8081/auth/realms/data-sec/protocol/openid-connect/certs" - - "http://{your openmetadata domain}/api/v1/config/jwks" # Update with your Domain and Make sure this "/api/v1/config/jwks" is always configured to enable JWT tokens + - "http://{your openmetadata domain}/api/v1/system/config/jwks" # Update with your Domain and Make sure this "/api/v1/system/config/jwks" is always configured to enable JWT tokens authority: "http://localhost:8081/auth/realms/data-sec" clientId: "open-metadata" callbackUrl: "http://localhost:8585/callback" diff --git a/openmetadata-docs/content/v1.2.x/deployment/security/keycloak/docker.md b/openmetadata-docs/content/v1.2.x/deployment/security/keycloak/docker.md index 663b9b2561cb..95436d4f3aa5 100644 --- a/openmetadata-docs/content/v1.2.x/deployment/security/keycloak/docker.md +++ b/openmetadata-docs/content/v1.2.x/deployment/security/keycloak/docker.md @@ -23,7 +23,7 @@ AUTHORIZER_PRINCIPAL_DOMAIN=open-metadata.org # Update with your domain AUTHENTICATION_PROVIDER=custom-oidc CUSTOM_OIDC_AUTHENTICATION_PROVIDER_NAME=KeyCloak -AUTHENTICATION_PUBLIC_KEYS=[http://localhost:8081/auth/realms/data-sec/protocol/openid-connect/certs, http://{your openmetadata domain}/api/v1/config/jwks] # Update with your Domain and Make sure this "/api/v1/config/jwks" is always configured to enable JWT tokens +AUTHENTICATION_PUBLIC_KEYS=[http://localhost:8081/auth/realms/data-sec/protocol/openid-connect/certs, http://{your openmetadata domain}/api/v1/system/config/jwks] # Update with your Domain and Make sure this "/api/v1/system/config/jwks" is always configured to enable JWT tokens AUTHENTICATION_AUTHORITY={http://localhost:8081/auth/realms/data-sec} AUTHENTICATION_CLIENT_ID=open-metadata # Update with your Client ID AUTHENTICATION_CALLBACK_URL=http://localhost:8585/callback diff --git a/openmetadata-docs/content/v1.2.x/deployment/security/keycloak/kubernetes.md b/openmetadata-docs/content/v1.2.x/deployment/security/keycloak/kubernetes.md index a4402dd4ab38..c5e6b2375f50 100644 --- a/openmetadata-docs/content/v1.2.x/deployment/security/keycloak/kubernetes.md +++ b/openmetadata-docs/content/v1.2.x/deployment/security/keycloak/kubernetes.md @@ -24,7 +24,7 @@ openmetadata: authentication: provider: "custom-oidc" publicKeys: - - "http://{your openmetadata domain}/api/v1/config/jwks" # Update with your Domain and Make sure this "/api/v1/config/jwks" is always configured to enable JWT tokens + - "http://{your openmetadata domain}/api/v1/system/config/jwks" # Update with your Domain and Make sure this "/api/v1/system/config/jwks" is always configured to enable JWT tokens - "http://localhost:8081/auth/realms/data-sec/protocol/openid-connect/certs" authority: "http://localhost:8081/auth/realms/data-sec" clientId: "{Client ID}" diff --git a/openmetadata-docs/content/v1.2.x/deployment/security/ldap/bare-metal.md b/openmetadata-docs/content/v1.2.x/deployment/security/ldap/bare-metal.md index 5026215d17b0..da87d77db684 100644 --- a/openmetadata-docs/content/v1.2.x/deployment/security/ldap/bare-metal.md +++ b/openmetadata-docs/content/v1.2.x/deployment/security/ldap/bare-metal.md @@ -14,7 +14,7 @@ The following configuration controls the auth mechanism for OpenMetadata. Update ```yaml authenticationConfiguration: provider: ${AUTHENTICATION_PROVIDER:-ldap} - publicKeyUrls: ${AUTHENTICATION_PUBLIC_KEYS:-[http://{your openmetadata domain}/api/v1/config/jwks]} # Update with your Domain and Make sure this "/api/v1/config/jwks" is always configured to enable JWT tokens + publicKeyUrls: ${AUTHENTICATION_PUBLIC_KEYS:-[http://{your openmetadata domain}/api/v1/system/config/jwks]} # Update with your Domain and Make sure this "/api/v1/system/config/jwks" is always configured to enable JWT tokens authority: ${AUTHENTICATION_AUTHORITY:-https://accounts.google.com} enableSelfSignup : ${AUTHENTICATION_ENABLE_SELF_SIGNUP:-false} ldapConfiguration: diff --git a/openmetadata-docs/content/v1.2.x/deployment/security/okta/bare-metal.md b/openmetadata-docs/content/v1.2.x/deployment/security/okta/bare-metal.md index 0cf9848f10d2..fd55426cc78d 100644 --- a/openmetadata-docs/content/v1.2.x/deployment/security/okta/bare-metal.md +++ b/openmetadata-docs/content/v1.2.x/deployment/security/okta/bare-metal.md @@ -14,7 +14,7 @@ authenticationConfiguration: provider: "okta" publicKeyUrls: - "{ISSUER_URL}/v1/keys" - - "http://{your openmetadata domain}/api/v1/config/jwks" # Update with your Domain and Make sure this "/api/v1/config/jwks" is always configured to enable JWT tokens + - "http://{your openmetadata domain}/api/v1/system/config/jwks" # Update with your Domain and Make sure this "/api/v1/system/config/jwks" is always configured to enable JWT tokens authority: "{ISSUER_URL}" clientId: "{CLIENT_ID - SPA APP}" callbackUrl: "http://localhost:8585/callback" diff --git a/openmetadata-docs/content/v1.2.x/deployment/security/okta/docker.md b/openmetadata-docs/content/v1.2.x/deployment/security/okta/docker.md index 3f057f20a7e6..72a4fbcca20e 100644 --- a/openmetadata-docs/content/v1.2.x/deployment/security/okta/docker.md +++ b/openmetadata-docs/content/v1.2.x/deployment/security/okta/docker.md @@ -27,7 +27,7 @@ AUTHORIZER_INGESTION_PRINCIPALS=[ingestion-bot, ] AUTHORIZER_PRINCIPAL_DOMAIN=open-metadata.org # Update with your domain AUTHENTICATION_PROVIDER=okta -AUTHENTICATION_PUBLIC_KEYS=[{ISSUER_URL}/v1/keys, http://{your openmetadata domain}/api/v1/config/jwks] # Update with your Domain and Make sure this "/api/v1/config/jwks" is always configured to enable JWT tokens +AUTHENTICATION_PUBLIC_KEYS=[{ISSUER_URL}/v1/keys, http://{your openmetadata domain}/api/v1/system/config/jwks] # Update with your Domain and Make sure this "/api/v1/system/config/jwks" is always configured to enable JWT tokens AUTHENTICATION_AUTHORITY={ISSUER_URL} # Update with your Issuer URL AUTHENTICATION_CLIENT_ID={CLIENT_ID - SPA APP} # Update with your Client ID AUTHENTICATION_CALLBACK_URL=http://localhost:8585/callback diff --git a/openmetadata-docs/content/v1.2.x/deployment/security/okta/kubernetes.md b/openmetadata-docs/content/v1.2.x/deployment/security/okta/kubernetes.md index d50f80887cac..eddb4698f857 100644 --- a/openmetadata-docs/content/v1.2.x/deployment/security/okta/kubernetes.md +++ b/openmetadata-docs/content/v1.2.x/deployment/security/okta/kubernetes.md @@ -25,7 +25,7 @@ openmetadata: authentication: provider: "okta" publicKeys: - - "http://{your openmetadata domain}/api/v1/config/jwks" # Update with your Domain and Make sure this "/api/v1/config/jwks" is always configured to enable JWT tokens + - "http://{your openmetadata domain}/api/v1/system/config/jwks" # Update with your Domain and Make sure this "/api/v1/system/config/jwks" is always configured to enable JWT tokens - "{ISSUER_URL}/v1/keys" authority: "{ISSUER_URL}" clientId: "{CLIENT_ID - SPA APP}" diff --git a/openmetadata-docs/content/v1.2.x/deployment/security/one-login/bare-metal.md b/openmetadata-docs/content/v1.2.x/deployment/security/one-login/bare-metal.md index 85639c862f47..d91e45955781 100644 --- a/openmetadata-docs/content/v1.2.x/deployment/security/one-login/bare-metal.md +++ b/openmetadata-docs/content/v1.2.x/deployment/security/one-login/bare-metal.md @@ -19,7 +19,7 @@ authenticationConfiguration: providerName: "OneLogin" publicKeyUrls: - "{IssuerUrl}/certs" - - "http://{your openmetadata domain}/api/v1/config/jwks" # Update with your Domain and Make sure this "/api/v1/config/jwks" is always configured to enable JWT tokens + - "http://{your openmetadata domain}/api/v1/system/config/jwks" # Update with your Domain and Make sure this "/api/v1/system/config/jwks" is always configured to enable JWT tokens authority: "{IssuerUrl}" clientId: "{client id}" callbackUrl: "http://localhost:8585/callback" diff --git a/openmetadata-docs/content/v1.2.x/deployment/security/one-login/docker.md b/openmetadata-docs/content/v1.2.x/deployment/security/one-login/docker.md index 9c1f5c083132..3f6ed6bcae8e 100644 --- a/openmetadata-docs/content/v1.2.x/deployment/security/one-login/docker.md +++ b/openmetadata-docs/content/v1.2.x/deployment/security/one-login/docker.md @@ -20,7 +20,7 @@ AUTHORIZER_ADMIN_PRINCIPALS=[admin] # Your `name` from name@domain.com AUTHORIZER_PRINCIPAL_DOMAIN=open-metadata.org # Update with your domain AUTHENTICATION_PROVIDER=custom-oidc -AUTHENTICATION_PUBLIC_KEYS=[{public key url}, http://{your openmetadata domain}/api/v1/config/jwks] # Update with your Domain and Make sure this "/api/v1/config/jwks" is always configured to enable JWT tokens +AUTHENTICATION_PUBLIC_KEYS=[{public key url}, http://{your openmetadata domain}/api/v1/system/config/jwks] # Update with your Domain and Make sure this "/api/v1/system/config/jwks" is always configured to enable JWT tokens AUTHENTICATION_AUTHORITY={issuer url} # Update with your Issuer URL AUTHENTICATION_CLIENT_ID={Client ID} # Update with your Client ID AUTHENTICATION_CALLBACK_URL=http://localhost:8585/callback diff --git a/openmetadata-docs/content/v1.2.x/deployment/security/one-login/kubernetes.md b/openmetadata-docs/content/v1.2.x/deployment/security/one-login/kubernetes.md index ad09778566d0..69a709c1ae3e 100644 --- a/openmetadata-docs/content/v1.2.x/deployment/security/one-login/kubernetes.md +++ b/openmetadata-docs/content/v1.2.x/deployment/security/one-login/kubernetes.md @@ -23,7 +23,7 @@ openmetadata: authentication: provider: "custom-oidc" publicKeys: - - "http://{your openmetadata domain}/api/v1/config/jwks" # Update with your Domain and Make sure this "/api/v1/config/jwks" is always configured to enable JWT tokens + - "http://{your openmetadata domain}/api/v1/system/config/jwks" # Update with your Domain and Make sure this "/api/v1/system/config/jwks" is always configured to enable JWT tokens - "{IssuerUrl}/certs" authority: "{IssuerUrl}" clientId: "{client id}"