-
-
Notifications
You must be signed in to change notification settings - Fork 597
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
OIDC issues with GCP #1556
Comments
Can your users log in when you comment out the TEAM_SYNCHROINZATION and TEAMS_CLAIM properties? Some OIDC providers require additional configuration for group synchronization. You could also try changing the TEAMS_CLAIM to groupList instead of groups |
@stevespringett I think it would be useful to extend the documentation on OIDC configuration with some example configurations for cloud providers like Azure and GCP. I personally had a lot of trouble configuring Azure AD for my DT instance and it seems to be the same with GCP |
Hi ! I don't have any groupList value with these scopes either. I found an article of Rancher about this subject: https://rancher.com/docs/rancher/v2.5/en/admin-settings/authentication/google/ |
@Rokkart I don’t think that’s possible yet, but that sounds like a good enhancement idea. Maybe every user should just be added to a Default group to make it easier for admins to manage permissions for new users |
I have seen the error It might be useful to see if the error message thrown by DT can be made more descriptive. Maybe an error came back from the IdP causing the problem of not being able to assemble the profile? Or some data is missing in some token? |
The issue is that no one who successfully set up OIDC on these platforms has contributed documentation yet. Most of these services require subscriptions of some kind, which makes it impractical for maintainers to just go through all them and write docs for them.
The error means that neither the ID token nor the |
@nscuro You’re right, I’ll try to contribute some documentation on how to set up Azure AD |
Indeed, while I was trying to make it work, I restarted multiple times the stack, without any improvement. As @nscuro said, the "groups" property is not returned by google with the scopes I configured. So it makes sense that in the error message "groups" is null. That's why in this article (https://rancher.com/docs/rancher/v2.5/en/admin-settings/authentication/google/) a Service Account is configured to get the groups with these scopes:
But DT is just not meant to work like this I guess. Anyway thank you guys for your help. If anyone contributes to the doc or find a way to make it work, let me know ;) |
Hi @AbdelHajou - this feature would still be useful. Should I create a new issue to track it? I found #979 that can be re-opened? |
@nscuro Is there working group mapping for gcp? Or when will 4.11 be released? |
This thread has been automatically locked since there has not been any recent activity after it was closed. Please open a new issue for related bugs. |
Introduces: * Ability to assign default groups to OIDC users (stevespringett/Alpine#535) * Tracking of `created` and `lastUsed` timestamps for API keys (stevespringett/Alpine#537) * Addition of `comment` field to API keys (stevespringett/Alpine#537) Closes DependencyTrack#1068 Fixes DependencyTrack#1556 Closes DependencyTrack#3349 Signed-off-by: nscuro <nscuro@protonmail.com> Signed-off-by: Mikael Carneholm <mikael.carneholm.2@wirelesscar.com>
Hi everyone !
I'm working on a deployment solution of Dependency Track for my company. I'm using the docker compose setup.
I'm currently stuck with the authentication. I want to use the OIDC feature to manage the users. But I'm facing an issue about how GCP answers to Dependency Track OIDC requests.
Current Behavior:
When I try to use OIDC to connect to Dependency Track, I get an error in the API container logs telling me that the OIDC profil isn't complete. After a quick look, I see that I don't get any group for my user. So I guess that Dependency Track can't associate my user with a team. I'll put the error logs and configuration details in the 'Additional Details' section.
Steps to Reproduce:
I configured the compose file accordingly to Dependency Track documentation.
On the login form, I click the SSO button and connect to my GSuite account.
Expected Behavior:
I should be able to connect to Dependency Track with OIDC and get the permissions of the team I'm associated with.
Environment:
Additional Details:
Here is the error I get :
2022-04-21 08:09:17,261 ERROR [OidcAuthenticationService] Unable to assemble complete profile (ID token: OidcProfile{subject='*****************', username='**************@*********', groups=null, email='**************@*********'}, UserInfo: OidcProfile{subject='*****************', username='**************@*********', groups=null, email='**************@*********'}, Merged: OidcProfile{subject='*****************', username='**************@*********', groups=null, email='**************@*********'})
Here is the API Server config:
Here is the Front Server config:
There is a lot of scopes because I thought I needed all of these to get a group. Apparently it's useless since I need some admin permissions in order to use them.
As a workaround, I thought a default group for all OIDC users would to the trick. Is this possible to create such a group ?
Also, I use "https://accounts.google.com" as my OIDC Issuer. As I was looking for a solution, I saw that the issuer should be "https://accounts.google.com/o/oauth2/auth". I already tried this but Dependency Track can't request this issuer and returns a 404 error.
The text was updated successfully, but these errors were encountered: