You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
SET AUTH 'oidc-mysso' {SET ID 'jakesUniqueMySsoId'} // this must match the claim that you configured via dbms.security.oidc.mysso.claims.username
332
+
SET AUTH 'oidc-mysso' {SET ID 'jakesUniqueMySsoId'} // `jakesUniqueMySsoId` must match the value of the claim that you configured via dbms.security.oidc.mysso.claims.username
333
333
----
334
334
335
335
Then natively grant the `READER` role to the user:
Copy file name to clipboardExpand all lines: modules/ROOT/pages/tutorial/tutorial-sso-configuration.adoc
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -142,7 +142,7 @@ For example to create a user `jake` who can authenticate using native or Okta, a
142
142
----
143
143
CREATE USER jake
144
144
SET HOME DATABASE 'jakesHomeDb'
145
-
SET AUTH 'oidc-okta' {SET ID 'jakesUniqueOktaUserId'} // this must match the claim that you configured via dbms.security.oidc.okta.claims.username
145
+
SET AUTH 'oidc-okta' {SET ID 'jakesUniqueOktaUserId'} // `jakesUniqueOktaUserId` must match the value of the claim that you configured via dbms.security.oidc.okta.claims.username
146
146
SET AUTH 'native' {SET PASSWORD 'changeme' SET PASSWORD CHANGE REQUIRED}
147
147
----
148
148
@@ -334,7 +334,7 @@ For example to create a user `jake` who can authenticate and authorize using Ent
334
334
----
335
335
CREATE USER jake
336
336
SET HOME DATABASE 'jakesHomeDb'
337
-
SET AUTH 'oidc-okta' {SET ID 'jakesUniqueEntraUserId'} // this must match the claim that you configured via dbms.security.oidc.azure.claims.username
337
+
SET AUTH 'oidc-okta' {SET ID 'jakesUniqueEntraUserId'} // `jakesUniqueEntraUserId` must match the value of the claim that you configured via dbms.security.oidc.azure.claims.username
338
338
----
339
339
340
340
See xref:authentication-authorization/sso-integration.adoc#auth-sso-auth-providers[SSO integration] for further examples.
SET AUTH 'oidc-google' {SET ID 'jakesUniqueGoogleUserId'} // this must match the claim that you configured via dbms.security.oidc.google.claims.username
404
+
SET AUTH 'oidc-google' {SET ID 'jakesUniqueGoogleUserId'} // `jakesUniqueGoogleUserId` must match the value of the claim that you configured via dbms.security.oidc.google.claims.username
405
405
----
406
406
407
407
.. Grant the user roles using native authorization.
CREATE USER jakesUniqueGoogleUserId // this must match the claim that you configured via dbms.security.oidc.google.claims.username
456
+
CREATE USER jakesUniqueGoogleUserId // `jakesUniqueGoogleUserId` must match the value of the claim that you configured via dbms.security.oidc.google.claims.username
457
457
SET HOME DATABASE 'jakesHomeDb'
458
458
SET PASSWORD 'secretpassword' SET PASSWORD CHANGE NOT
0 commit comments