Open PatBriPerso opened 2 years ago
Questions which I think are helpful for debugging:
Admin
an actual role in the IDP or not? If not, do you have the mapping from IDP roles to FAB roles somewhere?Thanks @fedepad.
In fact, I change the role of my user with the superset UI and give him the Admin role. Here is how I do that:
OIDC_ENABLE=False
so I can connect with the default Admin account (stored in the DB) and I change its passwordOIDC_ENABLE=True
and connect with a keycloak account. A new user was created in superset DBOIDC_ENABLE=False
, connect with the default Admin account and change the role of my keycloak user to AdminOIDC_ENABLE=True
, connect with my keycloak account and have the access issue (to the users list page)I have no specific roles for my keycloak user. I think he has the default keycloak roles but I do not know if those roles are sent to superset. I think roles on keycloak and roles on superset are not related (but I'm not sure).
@fedepad @PatBriPerso I created same user in keycloak and superset eventhough im able to see None user inevent log and througing timeout error any help regarding this. Seeing below
@fedepad @PatBriPerso I created same user in keycloak and superset eventhough im able to see None user inevent log and througing timeout error any help regarding this. Seeing below
![Uploading 20221019_213835.jpg…]()
Can we do role mapping between keycloak and superset with AUTH_TYPE=AUTH_OID?? Or is it only available with AUTH_OAUTH
@PatBriPerso are you still facing this issue, or should we close it?
Hi,
I got the same issue when i integrate with Zitadel is there any solution for this.
Having the same issue as OP. Unable to access User List as Admin.
Unable to access User Info as Admin, Alpha and Gamma. Symptoms similar to described as above.
Any advise given will be appreciated.
I confirm I have the same issue, if I disable OIDC auth, then I can access user list and user info. If I enable it then I get an "Access Denied". Superset version: 4.1.1 keycloak version: 26.0.5 I use some kind of role mapping between the roles in keycloak and the roles in superset. My logic is implemented in my CUSTOM_SECURITY_MANAGER.
It used to work well with superset version 2.1.0.
I setup superset to authenticate the users with keycloak as IdP. I'm able to connect to superset after validating a login/pwd on keycloak but I cannot access the users list page (/users/list) as an Admin.
How to reproduce the bug
Setup superset as described in "Additional context". Connect to superset through keycloak as an Admin Click on the menu Settings > List Users
Expected results
See the users list
Actual results
I'm back on the welcome page (/superset/welcome/) with a message saying "Access is Denied".
Screenshots
n/a
Environment
(please complete the following information):
superset version
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= Superset 1.4.2 -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=python --version
Python 3.8.12node -v
n/aChecklist
Make sure to follow these steps before submitting your issue - thank you!
Additional context
I have a keycloak setup with the url: https://auth.mydomain.com/ I create a realm named "demo" and a user on this realm. I add a client named "superset" (client ID) on this realm with a Client Protocol "openid-connect" and a Root URL "https://superset.demo.mydomain.com/"
My superset is accessible with the url: https://superset.demo.mydomain.com/
I use the Docker version of superset deployed on a Docker Swarm cluster. I use Traefik to route the HTTP requests to the containers (superset and keycloak).
To setup superset with keycloak, I follow these posts:
But I modify some files so I describe below my whole configuration.
Content of
/app/docker/requirements-local.txt
:The first 2 packages are used to connect to my clickhouse database. The third one is used to have the superset database on MySQL (instead of postgres). Only the fourth one is related to keycloak to enable OIDC (OpenID Connect).
Content of
/app/pythonpath/superset_config.py
:Content of
/app/pythonpath/superset_config_docker.py
:Content of
/app/pythonpath/keycloak_security_manager.py
:Content of
/app/pythonpath/client_secret.json
:The environment variables I pass to my Docker Swarm service:
NOTA: I remove my environment variables related to mysql and redis.
Thanks for your help. Tell me if some information is missing.