loud-keyboard-72751
03/07/2024, 7:16 AMinline:
auth:
appAuth:
authServerType: External
externalAuthServer:
# baseUrl: https://<keycloak-url>/auth/realms/<keycloak-realm> # Uncomment for Keycloak and update with your installation host and realm name
# baseUrl: <https://login.microsoftonline.com/><tenant-id>/oauth2/v2.0/authorize # Uncomment for Azure AD
# For Okta, use the Issuer URI of the custom auth server:
baseUrl: <https://dev>-<org-id>.<http://okta.com/oauth2/<auth-server-id|okta.com/oauth2/<auth-server-id>>
metadataUrl: .well-known/oauth-authorization-server
thirdPartyConfig:
flyteClient:
# Use the clientID generated by your IdP for the `flytectl` app registration
clientId: <flytectl-client-id>
redirectUri: <http://localhost:53593/callback>
scopes:
- offline
- all
userAuth:
openId:
# baseUrl: https://<keycloak-url>/auth/realms/<keycloak-realm> # Uncomment for Keycloak and update with your installation host and realm name
# baseUrl: <https://login.microsoftonline.com/><tenant-id>/oauth2/v2.0/authorize # Uncomment for Azure AD
# For Okta, use the Issuer URI of the custom auth server:
baseUrl: <https://dev>-<org-id>.<http://okta.com/oauth2/<auth-server-id|okta.com/oauth2/<auth-server-id>>
scopes:
- profile
- openid
# - offline_access # Uncomment if your IdP supports issuing refresh tokens (optional)
# Use the client ID and secret generated by your IdP for the first OIDC registration in the "Identity Management layer : OIDC" section of this guide
clientId: <oidc-clientId>
Also changed $HOME/.flyte/config.yaml to this:
admin:
# Update with the Flyte's ingress endpoint (e.g. flyteIngressIP for sandbox or <http://example.foobar.com|example.foobar.com>)
# You must keep the 3 forward-slashes after dns:
endpoint: dns:///<Flyte ingress url>
# Update auth type to `Pkce` or `ClientSecret`
authType: Pkce
# Set to the clientId (will be used for both Pkce and ClientSecret flows)
# Leave empty to use the value discovered through flyteAdmin's Auth discovery endpoint.
clientId: <Id>
# Set to the location where the client secret is mounted.
# Only needed/used for `ClientSecret` flow.
clientSecretLocation: </some/path/to/key>
But flytectl giving me following error on flytectl get projects.
"/usr/xdg-open error"
Also Note: I don't have GUI in my system.
Can you guys suggest what approach i will use to get rid of this error and successfully authenticate with Microsoft Azure AD in flytectl as well.average-finland-92144
03/07/2024, 4:47 PMauthType: DeviceFlow
loud-keyboard-72751
03/07/2024, 4:52 PMaverage-finland-92144
03/07/2024, 4:54 PMloud-keyboard-72751
03/07/2024, 5:06 PMaverage-finland-92144
03/07/2024, 5:18 PMthere is some change still needed in Azure AD to do.oh yes, I was about to mention that probably your IdP will require changes. Could you share what you had to change there?
loud-keyboard-72751
03/18/2024, 12:55 PMloud-keyboard-72751
03/18/2024, 1:01 PMalert-oil-1341
03/18/2024, 1:11 PMloud-keyboard-72751
03/18/2024, 1:21 PMalert-oil-1341
03/18/2024, 1:23 PMalert-oil-1341
03/18/2024, 1:23 PMopenid
explicitlyloud-keyboard-72751
03/18/2024, 1:24 PMalert-oil-1341
03/18/2024, 1:24 PMscopes
loud-keyboard-72751
03/18/2024, 1:24 PMalert-oil-1341
03/18/2024, 1:25 PMopenid
scope on the requestloud-keyboard-72751
03/18/2024, 1:28 PMalert-oil-1341
03/18/2024, 1:28 PMloud-keyboard-72751
03/18/2024, 1:30 PMloud-keyboard-72751
03/18/2024, 1:39 PMalert-oil-1341
03/18/2024, 2:28 PMaverage-finland-92144
03/19/2024, 3:52 PMloud-keyboard-72751
03/20/2024, 12:20 PMloud-keyboard-72751
03/20/2024, 12:25 PM