-
Notifications
You must be signed in to change notification settings - Fork 21
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Keycloak OIDC not supported #142
Comments
Bonnie Shen commented: |
Bonnie Shen commented: exalate-issue-sync[bot] commented: |
Bonnie Shen commented: |
Hi Bonnie,
Thanks for getting back to me - glad to see there are resources available
to help!
Sorry but I'm not seeing a link or any attachments here - could you please
resend?
Thanks,
Benjamin
…On Mon, 9 Sept 2024 at 16:23, exalate-issue-sync[bot] < ***@***.***> wrote:
Bonnie Shen commented:
Hello *Benjamin:*
Thanks for writing to us! Here's some resource to configure Keycloak as
OIDC provider. Please give it a try and let us know if it works for you.
Best,
W&B
—
Reply to this email directly, view it on GitHub
<#142 (comment)>, or
unsubscribe
<https://github.com/notifications/unsubscribe-auth/AEPAENGZX3RSBUEFK4T5XGDZVW4NFAVCNFSM6AAAAABN2D73EWVHI2DSMVQWIX3LMV43OSLTON2WKQ3PNVWWK3TUHMZDGMZYGQYTONZVGA>
.
You are receiving this because you authored the thread.Message ID:
***@***.***>
|
Thanks @boshwandb! Is that a private repo? I'm getting a 404. |
I apologize, it is currently a private repo. Let me list the instructions here in the next comment. Your patience is greatly appreciated. |
Keycloak Configuration
This is optional and you can use the master realm, but it's highly recommended to work with realms.
Next step after create the realm, is setup the The client type myst be
Keep the
For this configuration, the most important URL is the
When the client type
Still in the client configuration, navigate to the Search for the drop down menu Save the configuration.
Now the next step is assign users and/or groups to the newly created realm to allow users authenticate using the also newly created W&B ConfigurationThe W&B configuration will depend on how did you installed the platform. For this guide, I will cover the configuration using the W&B helm chart and the configuration via W&B Operator console.
As highlighted in the above link, you will need to add the Keycloak configuration according to the example below in the sso:
enabled: true
# Automatically provision a user if SSO auth succeeds
autoProvision: true
clientId: wandb
issuer: http://keycloak.home.lab/realms/wandb/
# Can be implicit or pkce
method: pkce Once the
Navigate to Login ScreensW&B Login Login redirected to Keycloak for Authentication In case the Keycloak user is also new, it may need to change the password depending how Keycloak is configured After SSO authentication, user is created in W&B Login is complete |
Bonnie Shen commented: We wanted to follow up with you regarding your support request as we have not heard back from you. Please let us know if we can be of further assistance or if your issue has been resolved. Best, |
Hi Bonnie. I have had a quick look (on docker, not with helm), though was hitting another issue - but I think that might be an networking problem my end. |
Bonnie Shen commented: We wanted to follow up with you regarding your support request as we have not heard back from you. Please let us know if we can be of further assistance or if your issue has been resolved. Best, |
Bonnie Shen commented: |
Release: wandb/local:0.58.1
I'm trying to configure a local instance of wandb to use Keycloak as an OIDC provider, but struggling to get it to work either through the web admin settings or by setting docker enviroment variables.
I believe it's because of the way keycloak uses 'realms' - so where most OIDC providers will use a URL of the schema
https://{DOMAIN}/users/sign_in
keycloak uses something likehttps://{DOMAIN}/realms/{REALM_NAME}/protocol/openid-connect/auth?client_id={CLIENT_ID}
.Other OIDC clients (e.g. Outline) allow more expressive docker environment variables which work with Keycloak, e.g:
But if I try to set these for wandb, the gorilla service still tries to use the old url schema and panics as it does not exist:
Apologies if this is implemented and I am missing it in the docs, but am struggling to find anything.
The text was updated successfully, but these errors were encountered: