@@ -104,6 +104,43 @@ coordinator:
104104 # To create a TLS secret, use the following command:
105105 # kubectl create secret tls ${TLS_SECRET_NAME} --key ${KEY_FILE} --cert ${CERT_FILE}
106106 secret : dremio-tls-secret-ui
107+
108+ oauth :
109+ # To enable OAuth 2.0 for the web UI, set the enabled flag to true and provide
110+ # the following required information
111+ enabled : false
112+
113+ # required, it is based on the OpenID provider.
114+ # clientId: ""
115+
116+ # required, it is based on the OpenID provider.
117+ # NOTE: In Dremio 24+, clientSecret can be encrypted using the dremio-admin encrypt CLI command.
118+ # clientSecret: ""
119+
120+ # required, the URL where Dremio is hosted. The URL must match the redirect url set in the OpenID Provider.
121+ # typically ends with /sso (e. g. https://<dremio-url>/sso)
122+ # redirectUrl: ""
123+
124+ # required, the location where Dremio can find the OpenID discovery document. For example, Google’s location
125+ # is https://accounts.google.com/.well-known/openid-configuration and the authorityUrl therefore to use is
126+ # https://accounts.google.com, the base location of the well-known directory.
127+ # authorityUrl: ""
128+
129+ # optional, it is based on the OpenID provider. openid scope is always required, other scopes can vary by provider.
130+ # defaults to openid
131+ scope :
132+ - openid
133+
134+ # optional, maps fields from the JWT token to fields Dremio requires. The only field currently required
135+ # is userName, which you should set to the field in JWT that contains the user’s username.
136+ # defaults to using the email as the userName
137+ jwtClaims :
138+ userName : email
139+
140+ # optional, any additional parameters required by the OpenID providers.
141+ # parameters:
142+ # - name: access_type
143+ # value: offline
107144
108145 # ODBC/JDBC Client
109146 client :
0 commit comments