Skip to content

Commit 65245b2

Browse files
authored
Update doc for Dex Known Issues (#3256)
* Update doc for Dex Known Issues. Signed-off-by: Oleg Volpres <[email protected]> Signed-off-by: Oleg Volpres <[email protected]> * sign-off commit Signed-off-by: Oleg Volpres <[email protected]> --------- Signed-off-by: Oleg Volpres <[email protected]>
1 parent dfe02ca commit 65245b2

File tree

1 file changed

+31
-0
lines changed

1 file changed

+31
-0
lines changed

common/dex/README.md

Lines changed: 31 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -187,3 +187,34 @@ kustomize build common/oauth2-proxy/overlays/m2m-dex-only/ | kubectl apply -f -
187187
## Final Checks
188188
- **Review Logs**: Make sure to tail the logs of the Dex, OAuth2 Proxy, and Istio ingress gateway deployments to verify that the configurations are working as expected.
189189
- **Test Authentication**: Try accessing your Kubeflow endpoint (ex. https://kubeflow.example.com) and verify that you’re redirected to Keycloak for authentication and that after login you are correctly returned to Kubeflow.
190+
191+
---
192+
193+
# Known issues
194+
195+
- Microsoft Azure deployment with AD groups authentication: having a large number of AD groups assigned to a user may lead to Dex authentication issues with HTTP 4xx/5xx responses. To fix this - make the authentication more precise with the whitelisting of the groups. [Documentation reference](https://dexidp.io/docs/connectors/microsoft/#:~:text=%2D%20email-,Groups,-When%20the%20groups)
196+
197+
Dex configMap example:
198+
199+
```yaml
200+
"connectors" = [
201+
{
202+
"type" = "microsoft"
203+
"id" = "microsoft"
204+
"name" = "Microsoft"
205+
"config" = {
206+
"clientID" = "$${DEX_MICROSOFT_CLIENT_ID}"
207+
"clientSecret" = "$${DEX_MICROSOFT_CLIENT_SECRET}"
208+
"redirectURI" = "https://kubeflow.example.com/dex/callback"
209+
"tenant" = "$${DEX_MICROSOFT_TENANT_ID}"
210+
211+
"emailToLowercase" = true (optional but should be always used)
212+
"groups" = "<AD groups>"
213+
"onlySecurityGroups" = true (optional, AD groups may have different assignments)
214+
"useGroupsAsWhitelist" = true
215+
}
216+
}
217+
]
218+
```
219+
---
220+

0 commit comments

Comments
 (0)