-
Notifications
You must be signed in to change notification settings - Fork 14.5k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Attach roles to AD groups - Azure OAuth #9583
Comments
Thanks for opening your first issue here! Be sure to follow the issue template! |
@sk2991 Would you mind sharing your Azure OAuth implementation? |
Is this helpful for you? I don't use Azure OAuth, so I'm not sure this change applies here. |
@elwinarens @rafaelpierre - I have used this link to configure Azure OAuth. |
@mik-laj It does help to some extent. Is there anyway to extend this? Instead of declaring "AUTH_USER_REGISTRATION_ROLE_JMESPATH = "contains(['alice@example.com', 'celine@example.com'], email) && 'Admin' || 'Public'"" this manually in config file - can we assign it dynamically? |
@sk2991 were you able to solve this using a more cleaner method than shared above? |
@hussainsaify I was not able to find any other way. |
We have implemented RBAC using Azure OAuth, Is there any way to attach a role to AD group - so that users part of that AD groups/Tenant can get default access to the attached role
Apache Airflow version: 1.10.10
Kubernetes version (if you are using kubernetes) (use
kubectl version
): 1.15.10Environment:
uname -a
): 4.15.0-1089-azureWhat happened:
What you expected to happen:
attach a role to AD group (or) Azure tenant
How to reproduce it:
Helm install stable/airflow
Implement RBAC using Azure OAuth
The text was updated successfully, but these errors were encountered: