You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Feature
Currently we keep non-secure configs in openmetadata.yaml and secure configs openmetadata-server.yaml.
Our ./bin/openmetadata-server-start.sh uses conf/openmetadata.yaml as the default config
It not only confuses our users but also hard to make the docker to go from non-secure to secure setup.
Describe the task
Have all the secure configs in openmetadata.yaml with authenticationConfiguration and authorizerConfiguration along with environment variables to secure those.
By default these will have non-secure configs. This will allow any interested users to continue to test OpenMetadata without securing through google or okta
The text was updated successfully, but these errors were encountered:
@Sachin-chaurasiya@darth-coder00 currently the UI tries to redirect the UI to auth provider if it sees authenticationConfiguration.
With this patch we want to support both secure/non-secure using environment variables.
Default configs you'll get
Feature
Currently we keep non-secure configs in openmetadata.yaml and secure configs openmetadata-server.yaml.
Our ./bin/openmetadata-server-start.sh uses conf/openmetadata.yaml as the default config
It not only confuses our users but also hard to make the docker to go from non-secure to secure setup.
Describe the task
Have all the secure configs in openmetadata.yaml with authenticationConfiguration and authorizerConfiguration along with environment variables to secure those.
By default these will have non-secure configs. This will allow any interested users to continue to test OpenMetadata without securing through google or okta
The text was updated successfully, but these errors were encountered: