[ 
https://issues.apache.org/jira/browse/ATLAS-3153?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16846470#comment-16846470
 ] 

Bolke de Bruin commented on ATLAS-3153:
---------------------------------------

[~srikvenk] I have already included documentation in the PR (twiki) that 
describes this. Do you want me to extend that?

 

We don't use Azure but the keycloak client should work with any oauth provider 
or (preferred) OpenID Connect (a layer on top of oauth). Azure supports both so 
with proper configuration in keycloak.json and maybe a mapper defined in 
Azure's service definition this should 'just' work. AuthN/Z are then both 
supported. If you disable Hadoop's UGI integration as documented you have 
roles/groups (exclusive this is a limitation of atlas at the moment not of 
keycloak/OpenID)

> Support OpenID Connect directly rather than through Knox
> --------------------------------------------------------
>
>                 Key: ATLAS-3153
>                 URL: https://issues.apache.org/jira/browse/ATLAS-3153
>             Project: Atlas
>          Issue Type: Improvement
>    Affects Versions: 2.0.0
>            Reporter: Bolke de Bruin
>            Priority: Major
>          Time Spent: 20m
>  Remaining Estimate: 0h
>
> The current SSO implementation with Apache Knox is limiting SSO 
> interoperability to Apache Knox. Knox uses JWT verification which could 
> easily be extended to allow for direct OpenID Connect support and doesn't 
> require organizations to deploy Knox.
> Required changes:
>  * Pickup bearer token from headers
>  * Improve and standardize redirecting
>  * Optionally: obtain certificates from well_known uri
>  * Optionally: obtain user groups from userinfo endpoint rather than UGI



--
This message was sent by Atlassian JIRA
(v7.6.3#76005)

Reply via email to