-
Notifications
You must be signed in to change notification settings - Fork 65
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Cloudbank followup to review auth config #3196
Comments
The username_pattern is configured in ccsf, demo, and srjc. In these three cases, we had a request to allow a specific personal Gmail account access to the hub. In the demo hub, we could remove the two gmail addresses there now but it might be easier to leave the username_pattern config because we sometimes have a need to let someone play around on the demo hub while we deal with configuration issues on their institution's hub. CCSF made a specific request to allow a specific email address access to the hub -- although they didn't need admin access for this user. SRJC has not started using their hub yet but I know we had some problems with the srjc.edu address that we punted on. They are a while off from course approval. I am not sure if your solution works because we don't necessarily want them to be admins. Maybe I am not getting this part right. I guess I am still a bit confused. For example, the SJCC config looks like this:
We don't need to allow anyone from berkeley.edu access to this hub. We just need Eric, Ksenyia, and myself. How do we set this up so it is cleaner? Maybe this is what you have done and I am good! |
@sean-morris ah excellent thanks for summarizing this! With oauth 16, you can allow an individual user without username_pattern involved by specifying the username in allowed_users (of admin_users). Before that caused other issues. Username patterns may no longer be needed. Should i tighten access configured in all hubs granted to users of the berkeley identity provider down to you/erik/ksenyia? |
Yes that would be great |
@sean-morris I like to minimize the complexity of auth config to make future maintenance easier, and sometimes it seems both berkeley and google as identity providers to help you/Erik/Ksenyia sign in with your @berkeley.edu emails. Can we reduce that to only use one identity provider instead? |
Should users of
urn:mace:incommon:berkeley.edu
generally be authorized?@sean-morris in #3144 I've migrated a lot of auth configuration from oauthenticator v15.1.0 config to oauthenticator v16.1.0 confg. Doing so I observed something that may not be intented in the auth config for cloudbank hubs and wanted to check with you the intent.
In almost all hubs configured to authenticate with the CILogon IdP
urn:mace:incommon:berkeley.edu
, all of the idps users get authorized access to the hub. The exception is those hub thatusername_pattern
is configured as that is a separate check that needs to be passed to be authorized.Is is your intent to authorize all users from that identity provider? If not, additional options arise in oauthenticator 16.1 that we are transitioning to now.
I've for now configured this previous behavior to remain the same by adding
allow_all
under that idp, but after this we can make any individual jupyterhub user listed inadmin_users
be authorized without authorizing all users from an idp likeurn:mace:incommon:berkeley.edu
.The text was updated successfully, but these errors were encountered: