You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
We are integrating OIDC with Azure AD for SSO in AKHQ and want to control role-based access (RBAC) effectively. Our requirement is to provide read-only access to developers and admin access to the DevOps team.
We are currently facing some confusion about where and how to define the roles and groups:
Should we define roles and group mappings at the Azure AD application level and rely on Azure's group claims?
Or, should we define roles and group mappings explicitly in the AKHQ configuration under the akhq.security.roles and akhq.security.groups settings?
Despite this setup, we’re noticing that controlling RBAC seems to depend on the Azure AD group assignments rather than being configurable entirely within AKHQ.
Questions:
Is it mandatory to configure RBAC at the Azure AD application level, or can AKHQ fully manage roles and groups defined in its own configuration?
How can we ensure that developers get read-only access while the DevOps team gets admin access without hardcoding group IDs across two platforms?
Are there any best practices for combining Azure AD and AKHQ configurations for RBAC?
reacted with thumbs up emoji reacted with thumbs down emoji reacted with laugh emoji reacted with hooray emoji reacted with confused emoji reacted with heart emoji reacted with rocket emoji reacted with eyes emoji
-
We are integrating OIDC with Azure AD for SSO in AKHQ and want to control role-based access (RBAC) effectively. Our requirement is to provide read-only access to developers and admin access to the DevOps team.
We are currently facing some confusion about where and how to define the roles and groups:
Should we define roles and group mappings at the Azure AD application level and rely on Azure's group claims?
Or, should we define roles and group mappings explicitly in the AKHQ configuration under the akhq.security.roles and akhq.security.groups settings?
Despite this setup, we’re noticing that controlling RBAC seems to depend on the Azure AD group assignments rather than being configurable entirely within AKHQ.
Questions:
Beta Was this translation helpful? Give feedback.
All reactions