You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs.feldera.com/docs/get-started/enterprise/authentication/index.mdx
+15-18Lines changed: 15 additions & 18 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -38,15 +38,12 @@ Users from the same organization share a tenant, derived from the issuer hostnam
38
38
39
39
### Managed Tenancy
40
40
41
-
Multiple teams can use the same Feldera instance with complete tenant isolation. Each team's users should be assigned to corresponding tenant(s) with the proper configuration of a dynamic tenant claim in the OIDC Access token. The managed tenant claims are always respected if issued.
41
+
Multiple teams can use the same Feldera instance with complete tenant isolation. Each team's users should be assigned to corresponding tenant(s) with the proper configuration of the dynamic `tenants` claim in the OIDC Access token.
42
42
43
-
The supported, mutually exclusive claims are:
43
+
The `tenants` claim authorizes the user to access any of the specified tenants. It is always respected if issued.
44
+
`tenants` can contain either a list, or a string of comma-separated tenant names.
44
45
45
-
-`tenant` - authorizes the user to access a single tenant
46
-
-`tenants` - authorizes the user to access any of the tenants in a list.
47
-
`tenants` can contain either a list, or a string of comma-separated tenant names.
48
-
49
-
The user can only interact with the API through a single tenant at a time. When using `tenants` claim, in Web Console the user can switch between the tenants they are authorized for.
46
+
The user can only interact with the API through a single tenant at a time. When the user is authorized to multiple tenants, in Web Console they can switch between the current tenant.
50
47
For HTTP API use, the current tenant name is specified in the `Feldera-Tenant` header.
Copy file name to clipboardExpand all lines: docs.feldera.com/docs/get-started/enterprise/authentication/okta-sso.md
+14-29Lines changed: 14 additions & 29 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -84,23 +84,21 @@ You can take advantage of the supported authorization models by properly configu
84
84
85
85
Feldera supports multiple authorization use-cases through [managed tenancy](index.mdx#Managed%20Tenancy). You can choose between the supported tenant claims to implement the appropriate authorization scenario. Navigate to the **Claims** tab in the Custom Authorization Server to configure one of:
86
86
87
-
### `tenant` claim
87
+
### `tenants` claim
88
88
89
-
Example configuration for the `tenant` claim that uses a randomly selected user group name prefixed with "feldera_" as the tenant name:
89
+
Example configuration for the `tenants` claim that assigns a single (randomly selected) user group name prefixed with "feldera_" as the tenant name:
@@ -117,33 +115,20 @@ Example configuration for the `groups` claim that communicates all groups that t
117
115
-**Value**: Select appropriate group filter or use all-inclusive regex `.*`
118
116
-**Include in**: `Any scope`
119
117
120
-
Consult [the relevant documentation](index.mdx#) for the corresponding Feldera configuration.
121
-
122
118
## Configure Feldera
123
119
124
-
### Helm Chart Configuration
120
+
Consult the documentation for [configuring the authentication](index.mdx#Configuration%20options) and [examples for common use-cases](index.mdx#Tenant%20Assignment%20use%20cases) to configure Feldera to authorize users properly.
125
121
126
-
Configure your Feldera Helm chart (`values.yaml`) with Okta settings:
122
+
One example of the Feldera Helm chart configuration for managed tenancy with Okta:
0 commit comments