GitHub user squalou created a discussion: Using Keycloak as identity provider 
wihtout role mappings (manage roles inside superset - like google oauth2)

Hi,

I'm trying to setup Keycloak in front on Superset, I've found lots of doc about 
it, and even if at the moment I do not manage to have it work I do have a 
question regarding roles management.

To date, I'm using Google as OAUTH2 identity provider.

It works fine : "login with google", redirect to superset, and then users 
inside superset can be granted whatever roles an Admin wants.

For <reasons> I wish I could do the same with Keycloak, which means
- keycloak would only provide a "yes / no" authentication
- roles would continue to be defined inside superset

is that possible ?

Whatever I try, so far, superset tells me "You are not authorized" when I try 
to login, that is : even if I manually force an 'Admin' role in 
superset_config.py in a CustomSsoSecurityManager class :)




GitHub link: https://github.com/apache/superset/discussions/36242

----
This is an automatically sent email for [email protected].
To unsubscribe, please send an email to: 
[email protected]


---------------------------------------------------------------------
To unsubscribe, e-mail: [email protected]
For additional commands, e-mail: [email protected]

Reply via email to