GitHub user squalou reopened a discussion: Using Keycloak as identity provider wihtout role mappings (manage roles inside superset - like google oauth2)
Hi, I'm trying to setup Keycloak in front on Superset, I've found lots of doc about it, and even if at the moment I do not manage to have it work I do have a question regarding roles management. To date, I'm using Google as OAUTH2 identity provider. It works fine : "login with google", redirect to superset, and then users inside superset can be granted whatever roles an Admin wants. For <reasons> I wish I could do the same with Keycloak, which means - keycloak would only provide a "yes / no" authentication - roles would continue to be defined inside superset is that possible ? Whatever I try, so far, superset tells me "You are not authorized" when I try to login, that is : even if I manually force an 'Admin' role in superset_config.py in a CustomSsoSecurityManager class :) GitHub link: https://github.com/apache/superset/discussions/36242 ---- This is an automatically sent email for [email protected]. To unsubscribe, please send an email to: [email protected] --------------------------------------------------------------------- To unsubscribe, e-mail: [email protected] For additional commands, e-mail: [email protected]
