This PR is here to add Azure AD Authentication to Orchestrator
Orchestrator for MySQL is using HTTP authentication with two account types: database administrator and guest. Account credentials are kept in an insecure place.
The goal is to have a simple Azure AD authentication implemented in the Golang back end of the application.
The Azure AD authentication must be an option to activate, not a replacement for the current security mechanism.
I am taking time off from maintaining this repo. I will not be reviewing pull requests.
Details in https://code.openark.org/blog/mysql/reducing-my-oss-involvement-and-how-it-affects-orchestrator-gh-ost
Related issue: https://github.com/openark/orchestrator/issues/1485
Description
This PR is here to add Azure AD Authentication to Orchestrator
Orchestrator for MySQL is using HTTP authentication with two account types: database administrator and guest. Account credentials are kept in an insecure place.
The goal is to have a simple Azure AD authentication implemented in the Golang back end of the application.
The Azure AD authentication must be an option to activate, not a replacement for the current security mechanism.