deployment

No menu items for this category
OpenMetadata Documentation

Google SSO Authentication Documentation - Public Client

OpenMetadata supports Single Sign-On (SSO) integration with various identity providers, enabling secure, centralized user authentication.

  • Navigate to: Settings > SSO
SSO Authentication
  • Select Google as the service Provider
Supported Providers

This configuration is recommended for public applications, such as SPAs (Single Page Applications) and mobile apps. It does not require a client secret.

Google SSO Configuration - Public Client
  • Definition: Defines whether the application is Public (no client secret) or Confidential (requires client secret).
  • Options: Public | Confidential
  • Example: Public
  • Why it matters: Determines the security level and OAuth flow type.
  • Note:
    • Choose Public for SPAs and mobile apps.
    • Google typically uses Confidential for server-side apps.
  • Definition: Redirect URL where Google sends authentication responses.
  • Example: https://yourapp.company.com/callback
  • Why it matters: Must match exactly with Google Cloud Console’s registered redirect URL.
  • Note:
    • Must be registered under OAuth 2.0 Client > Authorized Redirect URLs.
    • Always use HTTPS in production.
  • Definition: Allows users to automatically create accounts on first login.
  • Options: Enabled | Disabled
  • Example: Enabled
  • Why it matters: Controls whether new users are auto-created.
  • Note: Set to Disabled for stricter access control.
  • Definition: Google’s OAuth 2.0 authorization server.
  • Default & Example: https://accounts.google.com
  • Why it matters: Specifies where OpenMetadata should send auth requests.
  • Note: Usually does not need to be changed.
  • Definition: URL(s) where Google publishes its JWT signing keys.
  • Example: ["https://www.googleapis.com/oauth2/v3/certs"]
  • Why it matters: Required to verify JWT token signatures.
  • Note: Typically auto-discovered via OIDC discovery endpoint.
  • Definition: Algorithm used to validate JWT tokens.
  • Options: RS256 | RS384 | RS512
  • Default & Example: RS256
  • Why it matters: Must match Google’s signing algorithm.
  • Note: Google typically uses RS256.
  • Definition: JWT fields used to identify the user.
  • Example: ["email", "sub"]
  • Why it matters: Identifies the user in OpenMetadata.
  • Note: Use email for consistency and compatibility. For domain scoping, use the hd claim.
  • Definition: Maps JWT claims to OpenMetadata user attributes.
  • Example:
  • Why it matters: Maps identity information to OpenMetadata user profiles.
  • Note: Use the format openmetadata_field:jwt_claim.
  • Definition: List of email addresses with admin access.
  • Example: ["admin@company.com", "superuser@company.com"]
  • Why it matters: Grants admin-level privileges in the system.
  • Note: Email must match a JWT claim.
  • Definition: Default domain for constructing user emails.
  • Example: company.com
  • Why it matters: Helps form complete user identifiers from partial input.
  • Note: Matches your Google Workspace domain.
  • Definition: Restrict login to users from a specific domain.
  • Default: false
  • Example: true
  • Why it matters: Adds domain-level access control.
  • Note: Use with hd parameter in custom OIDC config.
  • Definition: Enables SSL/TLS for secure communications.
  • Default: false
  • Example: true
  • Why it matters: Ensures secure token exchange and communication.
  • Note: Must be true in production.

If users are automatically logged out and unable to log in again due to a bad authentication configuration, you can reset the security setup using the following command:

After executing the command, restart the server. The authentication values from your YAML or Helm chart will then be reapplied on startup. The following tiles detail how to apply this configuration across Docker, Kubernetes, and Bare Metal deployments: