Skip to content

custom OIDC provider RoleMapping #29770

Discussion options

You must be logged in to vote

Hi!
502 doesnt seem like something related to my problem to me.
But who knows. Now i ended up with following configuration:
Superset_config.py:


    ######################################################################
    #blitz_oauth
    ######################################################################
    from blitz_security_manager import OIDCSecurityManager
    from flask_appbuilder.security.manager import AUTH_OID, AUTH_REMOTE_USER, AUTH_DB, AUTH_LDAP, AUTH_OAUTH
    import os
    AUTH_TYPE = AUTH_OID
    SECRET_KEY: ''
    OIDC_CLIENT_SECRETS =  '/app/docker/configs/client_secret.json'
    OIDC_ID_TOKEN_COOKIE_SECURE = False
    OIDC_INTROSPECTION_AUTH_METHOD: 'client_secret_…

Replies: 2 comments 1 reply

Comment options

You must be logged in to vote
0 replies
Comment options

You must be logged in to vote
1 reply
@MikhailKrivyakin
Comment options

Answer selected by MikhailKrivyakin
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
2 participants