-
Notifications
You must be signed in to change notification settings - Fork 2
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Merge pull request #334 from stakater/app-regs
Update Azure AD instructions and fix image indentations and linting errors
- Loading branch information
Showing
26 changed files
with
211 additions
and
194 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
27 changes: 17 additions & 10 deletions
27
content/for-administrators/secure-your-cluster/azure-gso.md
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -1,26 +1,33 @@ | ||
# Configuring Azure AD Group Sync Application | ||
|
||
1. To enable sync groups from Azure AD (Microsoft's) account to Stakater Cloud you first have to register an application on Azure. Go to the <https://portal.azure.com> | ||
1. Open `Azure Active Directory` service | ||
1. On the left tab under the Manage section, click `App Registrations` | ||
1. Click on `New Registration`. Use `group-sync` under Name and click `Register` | ||
For Azure AD, two applications are needed, one for group synchronization, and one for the identity provider. Only users in target groups are synchronized. These are the steps to enable group sync: | ||
|
||
1. To enable sync groups from the Microsoft Azure AD account to Stakater Cloud you first have to register an application on Azure. Go to the [Azure Portal](https://portal.azure.com). | ||
1. Open the `Azure Active Directory` service | ||
1. On the left tab under the Manage section, click `App registrations` | ||
1. Click on `New registration`. Enter `group-sync` as name and click `Register`: | ||
|
||
![Azure AD](images/azure-ad.png) | ||
|
||
1. The GroupSync job requires additional permissions on the Azure AD tenant. To set these up, add the `Group.Read.All`, `GroupMember.Read.All`,`User.Read.All` entries under the `API Permissions` | ||
1. The `GroupSync` job requires additional permissions on the Azure AD tenant. To set these up, add these permissions under `API permissions` > `Configured permissions`: | ||
* `Group.Read.All` | ||
* `GroupMember.Read.All` | ||
* `User.Read.All` | ||
|
||
![Azure App API Permissions](images/azure-permissions-group-sync.png) | ||
|
||
1. Click on the newly created app `group-sync`. Click `Certificates & secrets` from the left tab. Click `New Client Secret`. Under `Expires` pick any option. Under `Description` enter *saap-group-sync*, and click `Add` | ||
1. Click on the newly created app `group-sync`. Click `Certificates & secrets` from the left tab. Click `New client secret`. Under `Expires` pick any option. Under `Description` enter `saap-group-sync`, and click `Add`: | ||
|
||
![Certificates and Secrets](images/azure-ad-certificates-secrets.png) | ||
|
||
1. Copy the value of the newly created client secret and note the `Application (client) ID` and `Directory (tenant) ID` of the `group-sync` app registration from the `Overview` tab. **Send this to Stakater Support** | ||
1. Copy the value of the newly created client secret and note the `Application (client) ID` and `Directory (tenant) ID` of the `group-sync` app registration from the `Overview` tab, and **send them to Stakater Support**: | ||
|
||
![Client-Tenant-ID](images/azure-ad-clientid-tenantid.png) | ||
|
||
## Items to be provided to Stakater Support | ||
|
||
- `Application (client) ID` | ||
- `Directory (tenant) ID` | ||
- `client Secret` | ||
Please provide the secrets via password manager: | ||
|
||
* `Application (client) ID` | ||
* `Directory (tenant) ID` | ||
* `Client Secret` |
26 changes: 17 additions & 9 deletions
26
content/for-administrators/secure-your-cluster/azure-idp.md
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -1,27 +1,35 @@ | ||
# Configuring Azure AD identity provider | ||
|
||
1. To enable login with Azure AD (Microsoft's) account you first have to register an OAuth application on Azure. Go to the <https://portal.azure.com> | ||
For Azure AD, two applications are needed, one for group synchronization, and one for the identity provider. These are the steps for identity provider: | ||
|
||
1. To enable login with a Microsoft Azure AD account you first have to register an OAuth application on Azure. Login to [Azure Portal](https://portal.azure.com). | ||
1. Open `Azure Active Directory` service | ||
1. On the left tab under the Manage section, click `App Registrations` | ||
1. Click on `New Registration`. Use `saap` under Name. Under Redirect URI section Choose `Web` and enter the Redirect URI (**This will be provided by Stakater Support**) and click `Register` | ||
1. Click on `New registration`. Enter `saap` as the name. Under the `Redirect URI` section, choose `Web` and enter the Redirect URI that **will be provided by Stakater Support** and click `Register`: | ||
|
||
![Azure AD](images/azure-ad.png) | ||
|
||
1. Go to "API permissions" and add the required Microsoft Graph API permissions. Typically, you need `User.Read` and `openid`, `profile`, and `email` permissions. | ||
1. lick on the newly created app `saap`. Click `Certificates & secrets` from the left tab. Click `New Client Secret`. Under `Expires` pick any option. Under `Description` put *saap oidc* and click `Add` | ||
1. Go to `API permissions` and add the required Microsoft Graph API permissions. Typically, you need these permissions: | ||
* `User.Read` | ||
* `openid` | ||
* `profile` | ||
* `email` | ||
1. Click on the newly created app `saap`. Click `Certificates & secrets` from the left tab. Click `New client secret`. Under `Expires` pick any option. Under `Description` enter `saap oidc` and click `Add`: | ||
|
||
![Certificates and Secrets](images/azure-ad-certificates-secrets.png) | ||
|
||
1. Copy the value of the newly created client secret and note the `Application (client) ID` and `Directory (tenant) ID` of the `saap` app registration from the `Overview` tab. **Send this to Stakater Support** | ||
1. Copy the value of the newly created client secret and note the `Application (client) ID` and `Directory (tenant) ID` of the `saap` app registration from the `Overview` tab. **Send this to Stakater Support**: | ||
|
||
![Client-Tenant-ID](images/azure-ad-clientid-tenantid.png) | ||
|
||
## Items provided by Stakater Support | ||
|
||
- `Redirect URIs` | ||
* `Redirect URIs` | ||
|
||
## Items to be provided to Stakater Support | ||
|
||
- `Application (client) ID` | ||
- `Directory (tenant) ID` | ||
- `client Secret` | ||
Please provide the secrets via password manager: | ||
|
||
* `Application (client) ID` | ||
* `Directory (tenant) ID` | ||
* `client Secret` |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -2,24 +2,25 @@ | |
|
||
To enable login with Google you first have to create a project and a client in the [Google Developer Console](https://console.cloud.google.com/project). | ||
|
||
1. Log in to the Google [Developer Console](https://console.cloud.google.com/project) | ||
1. Log in to the Google [Developer Console](https://console.cloud.google.com/project): | ||
|
||
![Developer console](images/google-developer-console.png) | ||
|
||
1. Click the `Create Project` button. Use any value for `Project name` and `Project ID` you want, then click the `Create` button. Wait for the project to be created (this may take a while). Once created you will be brought to the project's dashboard. | ||
1. Click the `Create Project` button. Use any value for `Project name` and `Project ID` you want, then click the `Create` button. Wait for the project to be created - this may take a while. Once created you will be brought to the project's dashboard: | ||
|
||
![Project Dashboard](images/google-dashboard.png) | ||
|
||
1. Google requires some basic information about the product before creating any secrets for it. For a new project, you have first to configure `OAuth consent screen`. Fill in `OAuth consent screen` details. Keep the **Application Type** `Internal`. Add the `email`, `profile` and `openid` in the allowed **Scopes**. Under **Authorized domains** add `kubeapp.cloud` along with any hosted domain(s) which you want to allow. e.g if Authorized domain is `xyz.com` then `[email protected]` will be allowed | ||
![Google OAuth consent screen](images/google-oauth-consent-screen.png) | ||
1. Google requires some basic information about the product before creating any secrets for it. For a new project, you have first to configure `OAuth consent screen`. Fill in `OAuth consent screen` details. Keep the **Application type** `Internal`. Add the `email`, `profile` and `openid` in the allowed **Scopes**. Under **Authorized domains** add `kubeapp.cloud` along with any hosted domains which you want to allow. For example, if Authorized domain is `xyz.com` then `[email protected]` will be allowed: | ||
|
||
1. Then navigate to the `APIs & Services` section in the Google Developer Console. On that screen, navigate to `Credentials` administration. select `OAuth client ID` under the `Create credentials` button. | ||
![Google OAuth consent screen](images/google-oauth-consent-screen.png) | ||
|
||
1. You will then be brought to the `Create OAuth client ID` page. Select `Web application` as the application type. Specify the name you want for your client. In `Redirect URI` (**This will be provided by Stakater Support**) click the Create button. | ||
1. Then navigate to the `APIs & Services` section in the Google Developer Console. On that screen, navigate to `Credentials` administration. Select `OAuth client ID` under the `Create credentials` button. | ||
|
||
1. You will then be brought to the `Create OAuth client ID` page. Select `Web application` as the application type. Specify the name you want for your client. Enter the `Authorized redirect URIs` that **Stakater Support provides**, then click the `Create` button: | ||
|
||
![Google OAuth screen](images/google-create-oauth-id.png) | ||
|
||
1. After you click Create you will be brought to the `Credentials` page. Click on your new OAuth 2.0 Client ID to view the settings of your new Google Client. You will need to obtain the `client ID` and `secret` **Send these to Stakater Support**. | ||
1. After you click `Create` you will be brought to the `Credentials` page. Click on your new `OAuth 2.0 Client ID` to view the settings of your new Google Client. You will need to provide the `Client ID` and `Client secret` to Stakater, **send these to Stakater Support**: | ||
|
||
![client-id-scret](images/google-client-id-secret.png) | ||
|
||
|
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Oops, something went wrong.