Forgot your password?
button in the login page and send emails to reset passwords.
You can override a user password in just a few steps:
Variable | Description | Required? | Default |
---|---|---|---|
AUTH_DISABLE_PASSWORD_AUTHENTICATION | If "true" disables signing in with plain passwords | false |
{{ lightdash_url }}
with the URL of your Lightdash instance. For example if you normally access Lightdash at https://lightdash.example.com/login
then you should use https://lightdash.example.com
as your {{ lightdash_url }}
.
{{ lightdash_url }}/api/v1/oauth/redirect/okta
{{ lightdash_url }}
{{ lightdash_url }}/api/v1/login/okta
dev-123456.okta.com
.
Finally, you need the Issuer URI. This is the URL of your Okta authorization server. You can use your Org authorization server which uses https://dev-123456.okta.com
as your issuer or select a custom authorization server. To find the issuer URI for a custom authorization server navigate to API > Authorization Servers and click on the authorization server and note the Issuer URI and Name of the authorization server. For example the default
authorization server has an issuer URI of https://dev-123456.okta.com/oauth2/default
.
OpenID Connect ID Token
section in the Okta application settings, add groups
to the Groups claim
field, by setting a Groups claims type to Filter
and a Filter to match expression to .*
AUTH_OKTA_EXTRA_SCOPES
environment variablegroups
, value type Groups
, matches regex .*
Variable | Description | Required? |
---|---|---|
AUTH_OKTA_DOMAIN | The {{ okta_domain }} . Should not include https:// | |
AUTH_OKTA_OAUTH_CLIENT_ID | The Client ID copied from the application settings in okta | |
AUTH_OKTA_OAUTH_CLIENT_SECRET | The Client secret copied from the application settings in okta | |
AUTH_OKTA_OAUTH_ISSUER | The Issuer URI copied from the authorization server. Should include https:// | |
AUTH_OKTA_AUTHORIZATION_SERVER_ID | Optional. The Name of a custom authorization server if not using the org authorization server. | |
AUTH_OKTA_EXTRA_SCOPES | Optional. The extra scopes (e.g. “groups”) when not using a custom authorization server |
Variable | Description | Required? |
---|---|---|
AUTH_ENABLE_GROUP_SYNC | If "true" enables group sync from Okta. |
https://{{ lightdash_domain }}
https://{{ lightdash_domain }}/api/v1/oauth/redirect/google
{{ lightdash_domain }}
is the domain you use to sign in to Lightdash such as mycompany.lightdash.com
These environment variables must be provided to Lightdash to enable you to control Single Sign On (SSO) functionality for Google
Variable | Description | Required? | Default |
---|---|---|---|
AUTH_GOOGLE_ENABLED | Required to be set to true for Google SSO | ||
AUTH_GOOGLE_OAUTH2_CLIENT_ID | Required see instructions above | ||
AUTH_GOOGLE_OAUTH2_CLIENT_SECRET | Required see instructions above |
{{site_url}}/api/v1/login/oneLogin
{{site_url}}/api/v1/oauth/redirect/oneLogin
web
post
true
Variable | Description | Required? | Default |
---|---|---|---|
AUTH_ONE_LOGIN_OAUTH_CLIENT_ID | Required for One Login SSO | ||
AUTH_ONE_LOGIN_OAUTH_CLIENT_SECRET | Required for One Login SSO | ||
AUTH_ONE_LOGIN_OAUTH_ISSUER | Required for One Login SSO |
{{ lightdash_url }}/api/v1/oauth/redirect/azuread
{{ lightdash_url }}
with the URL of your Lightdash instance. For example if you normally access Lightdash at https://lightdash.example.com/login
then you should use https://lightdash.example.com
as your {{ lightdash_url }}
.
Hit Register and you’ll be taken to the application settings page. Copy the “Application (client) ID” and “Directory (tenant) ID” values as you’ll need them later.
In the left hand menu, navigate to Certificates & secrets and click New client secret. Give the secret a description and choose an expiry time. Hit Add and you’ll be shown the secret value. Copy this value as you’ll need it later.
Variable | Description | Required? | Default |
---|---|---|---|
AUTH_AZURE_AD_OAUTH_CLIENT_ID | Required for Azure AD | ||
AUTH_AZURE_AD_OAUTH_CLIENT_SECRET | Required for Azure AD | ||
AUTH_AZURE_AD_OAUTH_TENANT_ID | Required for Azure AD | ||
AUTH_AZURE_AD_OIDC_METADATA_ENDPOINT | Optional for Azure AD | ||
AUTH_AZURE_AD_X509_CERT_PATH | Optional for Azure AD | ||
AUTH_AZURE_AD_X509_CERT | Optional for Azure AD | ||
AUTH_AZURE_AD_PRIVATE_KEY_PATH | Optional for Azure AD | ||
AUTH_AZURE_AD_PRIVATE_KEY | Optional for Azure AD |
Variable | Description | Required? | Default |
---|---|---|---|
AUTH_OIDC_CLIENT_ID | |||
AUTH_OIDC_CLIENT_SECRET | Required unless AUTH_METHOD is private_key_jwt | ||
AUTH_OIDC_METADATA_DOCUMENT_URL | URL to OIDC metadata discovery endpoint | ||
AUTH_OIDC_AUTH_METHOD | client_secret_basic or private_key_jwt | client_secret_basic | |
AUTH_OIDC_X509_CERT | PEM-encoded content of a public key certificate for private_key_jwt | ||
AUTH_OIDC_PRIVATE_KEY | PEM-encoded content of a private key file for private_key_jwt | ||
AUTH_OIDC_X509_CERT_PATH | Path to a PEM-encoded public key certificate for private_key_jwt | ||
AUTH_OIDC_PRIVATE_KEY_PATH | Path to a PEM-encoded private key for private_key_jwt | ||
AUTH_OIDC_SCOPES | List of space-delimited OIDC scopes |