Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

patch: make groups scope optional to support azure with OIDC (#9773) #9778

Draft
wants to merge 2 commits into
base: release-0.34.0
Choose a base branch
from

Conversation

channolanp
Copy link
Contributor

@channolanp channolanp commented Aug 1, 2024

Ticket

CM-407

Description

Draft for customer demo requiring Azure/Entra auth only

Test Plan

Tested and merged into main for 0.35.0 release already

Checklist

  • Changes have been manually QA'd
  • New features have been approved by the corresponding PM
  • User-facing API changes have the "User-facing API Change" label
  • Release notes have been added as a separate file under docs/release-notes/
    See Release Note for details.
  • Licenses have been included for new code which was copied and/or modified from any external code

@cla-bot cla-bot bot added the cla-signed label Aug 1, 2024
Copy link

codecov bot commented Aug 1, 2024

Codecov Report

All modified and coverable lines are covered by tests ✅

Project coverage is 52.21%. Comparing base (ede2396) to head (59a443f).

Additional details and impacted files
@@                Coverage Diff                 @@
##           release-0.34.0    #9778      +/-   ##
==================================================
+ Coverage           49.83%   52.21%   +2.37%     
==================================================
  Files                1247      753     -494     
  Lines              162284   112450   -49834     
  Branches             2887     2888       +1     
==================================================
- Hits                80878    58712   -22166     
+ Misses              81234    53566   -27668     
  Partials              172      172              
Flag Coverage Δ
backend 34.25% <ø> (-9.75%) ⬇️
harness 63.74% <ø> (ø)
web 46.16% <ø> (ø)

Flags with carried forward coverage won't be shown. Click here to find out more.

see 495 files with indirect coverage changes

@determined-ci determined-ci requested a review from a team August 1, 2024 14:17
@determined-ci determined-ci added the documentation Improvements or additions to documentation label Aug 1, 2024
managers in the cluster.

**NOTE:** ``resource_manager.cluster_name`` is separate from the ``cluster_name`` field of the
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
**NOTE:** ``resource_manager.cluster_name`` is separate from the ``cluster_name`` field of the
.. note::
The `resource_manager.cluster_name` is distinct from the `cluster_name` field in the master configuration, which provides a readable name for the Determined deployment.

managers in the cluster.

**NOTE:** ``resource_manager.cluster_name`` is separate from the ``cluster_name`` field of the
master config that provides a readable name for the Determined deployment.
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
master config that provides a readable name for the Determined deployment.

``always_redirect``
===================

Specifies if this OIDC provider should be used for authentication, bypassing the standard Determined
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
Specifies if this OIDC provider should be used for authentication, bypassing the standard Determined
Specifies whether this OIDC provider should be used for authentication, bypassing the standard Determined

===================

Specifies if this OIDC provider should be used for authentication, bypassing the standard Determined
sign-in page. This redirection persists unless the user explicitly signs out within the WebUI. If an
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
sign-in page. This redirection persists unless the user explicitly signs out within the WebUI. If an
sign-in page. This redirection persists unless the user explicitly signs out via the WebUI. If an


Specifies if this OIDC provider should be used for authentication, bypassing the standard Determined
sign-in page. This redirection persists unless the user explicitly signs out within the WebUI. If an
SSO user attempts to use an expired session token, they are directly redirected to the SSO provider
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
SSO user attempts to use an expired session token, they are directly redirected to the SSO provider
SSO user attempts to use an expired session token, they will be redirected to the SSO provider

``exclude_groups_scope``
========================

Specifies if the groups scope should be excluded for this OIDC provider. For most OIDC providers
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
Specifies if the groups scope should be excluded for this OIDC provider. For most OIDC providers
Indicates whether the groups scope should be excluded for this OIDC provider. For most OIDC providers

========================

Specifies if the groups scope should be excluded for this OIDC provider. For most OIDC providers
such as Okta, this should be false (or blank) if you'd like to provision group memberships. But for
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
such as Okta, this should be false (or blank) if you'd like to provision group memberships. But for
such as Okta, this should be set to false (or blank) if you want to provision group memberships. However, for

``always_redirect``
===================

Specifies if this SAML provider should be used for authentication, bypassing the standard Determined
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
Specifies if this SAML provider should be used for authentication, bypassing the standard Determined
Specifies whether this SAML provider should be used for authentication, bypassing the standard Determined

===================

Specifies if this SAML provider should be used for authentication, bypassing the standard Determined
sign-in page. This redirection persists unless the user explicitly signs out within the WebUI. If a
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
sign-in page. This redirection persists unless the user explicitly signs out within the WebUI. If a
sign-in page. This redirection persists unless the user explicitly signs out via the WebUI. If a


Specifies if this SAML provider should be used for authentication, bypassing the standard Determined
sign-in page. This redirection persists unless the user explicitly signs out within the WebUI. If a
SSO user attempts to use an expired session token, they are directly redirected to the SAML provider
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
SSO user attempts to use an expired session token, they are directly redirected to the SAML provider
SSO user attempts to use an expired session token, they will be redirected to the SAML provider

Copy link
Member

@tara-det-ai tara-det-ai left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

added suggestions

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
cla-signed documentation Improvements or additions to documentation
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants