deployment

No menu items for this category
OpenMetadata Documentation

Google SSO Authentication Documentation - Public Client

OpenMetadata supports Single Sign-On (SSO) integration with various identity providers, enabling secure, centralized user authentication.

  • Navigate to: Settings > SSO
SSO Authentication
  • Select Google as the service Provider
Supported Providers

This configuration is recommended for public applications, such as SPAs (Single Page Applications) and mobile apps. It does not require a client secret.

Google SSO Configuration - Public Client
  • Definition: Defines whether the application is Public (no client secret) or Confidential (requires client secret).
  • Options: Public | Confidential
  • Example: Public
  • Why it matters: Determines the security level and OAuth flow type.
  • Note:
    • Choose Public for SPAs and mobile apps.
    • Google typically uses Confidential for server-side apps.
  • Definition: Redirect URL where Google sends authentication responses.
  • Example: https://yourapp.company.com/callback
  • Why it matters: Must match exactly with Google Cloud Console’s registered redirect URL.
  • Note:
    • Must be registered under OAuth 2.0 Client > Authorized Redirect URLs.
    • Always use HTTPS in production.
  • Definition: Allows users to automatically create accounts on first login.
  • Options: Enabled | Disabled
  • Example: Enabled
  • Why it matters: Controls whether new users are auto-created.
  • Note: Set to Disabled for stricter access control.
  • Definition: Google’s OAuth 2.0 authorization server.
  • Default & Example: https://accounts.google.com
  • Why it matters: Specifies where OpenMetadata should send auth requests.
  • Note: Usually does not need to be changed.
  • Definition: URL(s) where Google publishes its JWT signing keys.
  • Example: ["https://www.googleapis.com/oauth2/v3/certs"]
  • Why it matters: Required to verify JWT token signatures.
  • Note: Typically auto-discovered via OIDC discovery endpoint.
  • Definition: Algorithm used to validate JWT tokens.
  • Options: RS256 | RS384 | RS512
  • Default & Example: RS256
  • Why it matters: Must match Google’s signing algorithm.
  • Note: Google typically uses RS256.
  • Definition: JWT fields used to identify the user.
  • Example: ["email", "sub"]
  • Why it matters: Identifies the user in OpenMetadata.
  • Note: Use email for consistency and compatibility. For domain scoping, use the hd claim.
  • Definition: Maps JWT claims to OpenMetadata user attributes.
  • Example:
  • Why it matters: Maps identity information to OpenMetadata user profiles.
  • Note: Use the format openmetadata_field:jwt_claim.
  • Definition: List of email addresses with admin access.
  • Example: ["admin@company.com", "superuser@company.com"]
  • Why it matters: Grants admin-level privileges in the system.
  • Note: Email must match a JWT claim.
  • Definition: Default domain for constructing user emails.
  • Example: company.com
  • Why it matters: Helps form complete user identifiers from partial input.
  • Note: Matches your Google Workspace domain.
  • Definition: Restrict login to users from a specific domain.
  • Default: false
  • Example: true
  • Why it matters: Adds domain-level access control.
  • Note: Use with hd parameter in custom OIDC config.
  • Definition: Enables SSL/TLS for secure communications.
  • Default: false
  • Example: true
  • Why it matters: Ensures secure token exchange and communication.
  • Note: Must be true in production.