Skip to content

Commit

Permalink
Apply suggestions from code review
Browse files Browse the repository at this point in the history
  • Loading branch information
TomShawn authored Jul 30, 2021
1 parent 0f36711 commit df5d9ae
Show file tree
Hide file tree
Showing 2 changed files with 42 additions and 42 deletions.
20 changes: 10 additions & 10 deletions dashboard/dashboard-session-share.md
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
---
title: Share TiDB Dashboard Sessions
summary: Learn how to share current TiDB Dashboard sessions to others to access.
summary: Learn how to share the current TiDB Dashboard session to other users.
---

# Share TiDB Dashboard Sessions
Expand All @@ -11,45 +11,45 @@ You can share the current session of the TiDB Dashboard to other users so that t

1. Sign into TiDB Dashboard.

2. Click the username in the left sidebar to access the configure page.
2. Click the username in the left sidebar to access the configuration page.

3. Click **Share Current Session**.

![Sample Step](/media/dashboard/dashboard-session-share-settings-1.png)
![Sample Step](/media/dashboard/dashboard-session-share-settings-1.png)

> **Note:**
>
> For security, the shared session cannot be shared again.
> For security reasons, the shared session cannot be shared again.
4. Adjust sharing settings in the popup dialog:

- Expire in: How long the shared session will last for. Signing out the current session will not sign out any shared sessions.
- Expire in: How long the shared session will be effective. Signing out of the current session does not affect the effective time of the shared session.

- Share as read-only privilege: The shared session can only perform read operations but not write operations (like modifying configurations).
- Share as read-only privilege: The shared session only permits read operations but not write operations (such as modifying configurations).

5. Click **Generate Authorization Code**.

![Sample Step](/media/dashboard/dashboard-session-share-settings-2.png)

6. Provide the generate **Authorization Code** to the user that you want to share session to.
6. Provide the generated **Authorization Code** to the user to whom you want to share the session.

![Sample Step](/media/dashboard/dashboard-session-share-settings-3.png)

> **Warning:**
>
> Anyone can use the TiDB Dashboard with the authorization code. For this reason, please keep the authorization code secure and do not send it to someone that is untrusted to avoid unauthorized access.
> Keep your authorization code secure and do not send it to anyone who is untrusted. Otherwise, they will be able to access and operate TiDB Dashboard without your authorization.
## Steps for the Invitee

1. In the sign in page in TiDB Dashboard, click **Use Alternative Authentication**.
1. On the sign-in page of TiDB Dashboard, click **Use Alternative Authentication**.

![Sample Step](/media/dashboard/dashboard-session-share-signin-1.png)

2. Click **Authorization Code** to use it to sign in.

![Sample Step](/media/dashboard/dashboard-session-share-signin-2.png)

3. Enter the authorization code you receive from others.
3. Enter the authorization code you have received from the inviter.

4. Click **Sign In**.

Expand Down
64 changes: 32 additions & 32 deletions dashboard/dashboard-session-sso.md
Original file line number Diff line number Diff line change
@@ -1,38 +1,38 @@
---
title: Configure SSO for TiDB Dashboard
summary: Learn how to enable SSO sign in for TiDB Dashboard
summary: Learn how to enable SSO to sign into TiDB Dashboard.
---

# Configure SSO for TiDB Dashboard

TiDB Dashboard supports [OIDC](https://openid.net/connect/) based Single Sign-On (SSO). After enabling the SSO feature of the TiDB Dashboard, users can authenticate with the configured SSO service and then use TiDB Dashboard without entering the SQL user password.
TiDB Dashboard supports [OIDC](https://openid.net/connect/)-based Single Sign-On (SSO). After enabling the SSO feature of TiDB Dashboard, the configured SSO service is used for your sign-in authentication and then you can access TiDB Dashboard without entering the SQL user password.

## Configure OIDC SSO

### Enable SSO

1. Sign into TiDB Dashboard.

2. Click the username in the left sidebar to access the configure page.
2. Click the username in the left sidebar to access the configuration page.

3. Under the **Single Sign-On** section, select **Enable to use SSO when sign into TiDB Dashboard**
3. In the **Single Sign-On** section, select **Enable to use SSO when sign into TiDB Dashboard**.

4. Fill the **OIDC Client ID** and the **OIDC Discovery URL** fields in the form.

Generally the two fields can be obtained from the SSO service provider:
Generally, you can obtain the two fields from the SSO service provider:

- OIDC Client ID: a.k.a. OIDC Token Issuer
- OIDC Discovery URL: a.k.a. OIDC Token Audience
- OIDC Client ID is also called OIDC Token Issuer.
- OIDC Discovery URL is also called OIDC Token Audience.

5. Click **Authorize Impersonation** and input the SQL password.

TiDB Dashboard will store this SQL password and use it to impersonate a normal SQL sign-in after an SSO sign in is finished.
TiDB Dashboard will store this SQL password and use it to impersonate a normal SQL sign-in after an SSO sign-in is finished.

![Sample Step](/media/dashboard/dashboard-session-sso-enable-1.png)

> **Note:**
>
> The password you entered will be encrypted and stored. The SSO sign-in will fail after the password of the SQL user is changed. In this case, you can re-enter the password to bring SSO back again.
> The password you have entered will be encrypted and stored. The SSO sign-in will fail after the password of the SQL user is changed. In this case, you can re-enter the password to bring SSO back.
6. Click **Authorize and Save**.

Expand All @@ -42,63 +42,63 @@ TiDB Dashboard supports [OIDC](https://openid.net/connect/) based Single Sign-On

![Sample Step](/media/dashboard/dashboard-session-sso-enable-3.png)

Now SSO sign in has been enabled for TiDB Dashboard.
Now SSO sign-in has been enabled for TiDB Dashboard.

> **Note:**
>
> For security, some SSO services requires additional configuration for the SSO service, like trusted sign in and sign out URIs. Please refer to the documentation of the SSO service for further information.
> For security reasons, some SSO services require additional configuration for the SSO service, such as the trusted sign-in and sign-out URIs. Refer to the documentation of the SSO service for further information.
### Disable SSO

You can disable the SSO, which will completely erase the stored SQL password:

1. Sign into TiDB Dashboard.

2. Click the username in the left sidebar to access the configure page.
2. Click the username in the left sidebar to access the configuration page.

3. Under the **Single Sign-On** section, deselect **Enable to use SSO when sign into TiDB Dashboard**
3. In the **Single Sign-On** section, deselect **Enable to use SSO when sign into TiDB Dashboard**.

4. Click **Update** (Update) to save the configuration.

![Sample Step](/media/dashboard/dashboard-session-sso-disable.png)

### Re-entering the Password after a Password Change
### Re-enter the password after a password change

The SSO sign-in will fail once the password of the SQL user is changed. In this case, you can bring back the SSO sign-in by re-entering the SQL password:

1. Sign into TiDB Dashboard.

2. Click the username in the left sidebar to access the configure page.
2. Click the username in the left sidebar to access the configuration page.

3. Under the **Single Sign-On** section, Click **Authorize Impersonation** and input the updated SQL password.
3. In the **Single Sign-On** section, Click **Authorize Impersonation** and input the updated SQL password.

![Sample Step](/media/dashboard/dashboard-session-sso-reauthorize.png)

4. Click **Authorize and Save**.

## Sign in with SSO
## Sign in via SSO

Once SSO is configured for the TiDB Dashboard, you can sign in via SSO by following steps below:
Once SSO is configured for TiDB Dashboard, you can sign in via SSO by taking following steps:

1. In the sign in page of TiDB Dashboard, click **Sign in via Company Account**.
1. In the sign-in page of TiDB Dashboard, click **Sign in via Company Account**.

![Sample Step](/media/dashboard/dashboard-session-sso-signin.png)

2. Sign in in the configured SSO service.
2. Sign into the system with SSO service configured.

3. You will be redirected back to the TiDB Dashboard to finish the sign in.
3. You are redirected back to TiDB Dashboard to finish the sign-in.

## Sample: Use Okta for TiDB Dashboard SSO
## Example: Use Okta for TiDB Dashboard SSO sign-in

[Okta](https://www.okta.com/) is an OIDC SSO identity service, which is compatible with the SSO feature of TiDB Dashboard. Steps below demostrates how to configure Okta and TiDB Dashboard so that Okta can be used as the TiDB Dashboard SSO provider.
[Okta](https://www.okta.com/) is an OIDC SSO identity service, which is compatible with the SSO feature of TiDB Dashboard. The steps below demonstrate how to configure Okta and TiDB Dashboard so that Okta can be used as the TiDB Dashboard SSO provider.

### Step 1: Configure Okta

First, create an Okta Application Integration.
First, create an Okta Application Integration to integrate SSO.

1. Access Okta admin site.
1. Access the Okta administration site.

2. Navigate from left sidebar **Applications** > **Applications**.
2. Navigate from the left sidebar **Applications** > **Applications**.

3. Click **Create App Integration**

Expand All @@ -108,19 +108,19 @@ First, create an Okta Application Integration.

5. Choose **Single-Page Application** in **Application Type**.

6. Click **Next** button.
6. Click the **Next** button.

![Sample Step](/media/dashboard/dashboard-session-sso-okta-2.png)

7. Fill **Sign-in redirect URIs** as:
7. Fill **Sign-in redirect URIs** as follows:

```
http://DASHBOARD_IP:PORT/dashboard/?sso_callback=1
```

Substitute `DASHBOARD_IP:PORT` with the actual domain (or IP address) and port that you use to access the TiDB Dashboard in the browser.

8. Fill **Sign-out redirect URIs** as:
8. Fill **Sign-out redirect URIs** as follows:

```
http://DASHBOARD_IP:PORT/dashboard/
Expand All @@ -130,7 +130,7 @@ First, create an Okta Application Integration.

![Sample Step](/media/dashboard/dashboard-session-sso-okta-3.png)

9. Configure what kind of users in the organization is allowed to SSO sign in in the **Assignments** field, and then click **Save** to save the configuration.
9. Configure what type of users in your organization is allowed for SSO sign-in in the **Assignments** field, and then click **Save** to save the configuration.

![Sample Step](/media/dashboard/dashboard-session-sso-okta-4.png)

Expand All @@ -144,8 +144,8 @@ First, create an Okta Application Integration.

![Sample Step 2](/media/dashboard/dashboard-session-sso-okta-info-2.png)

3. Open TiDB Dashboard configure page, fill **OIDC Client ID** with **Issuer** obtained from the last step and fill **OIDC Discovery URL** with **Audience**. Then finish the authorization and save configuration, as:
3. Open the TiDB Dashboard configuration page, fill **OIDC Client ID** with **Issuer** obtained from the last step and fill **OIDC Discovery URL** with **Audience**. Then finish the authorization and save the configuration. For example:

![Sample Step 3](/media/dashboard/dashboard-session-sso-okta-info-3.png)

Now TiDB Dashboard has been configured to use Okta SSO for signing in.
Now TiDB Dashboard has been configured to use Okta SSO for sign-in.

0 comments on commit df5d9ae

Please sign in to comment.