-
Notifications
You must be signed in to change notification settings - Fork 3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
fix(ingest) Azure AD: support nested groups (#4367) #4368
fix(ingest) Azure AD: support nested groups (#4367) #4368
Conversation
Thanks for the PR @cccs-eric ! I'm assuming "nested groups" are groups inside other groups? Do we plan to deal with this by "flattening" the nested group to add all of the nested users to the root group on DataHub? |
That's exactly it @jjoyce0510 . Let's say we have the following:
When ingesting Group A, the source will now create a CorpGroup for Group A, and users 1,2,3,4,5 will be a member of Group A only. Group B and C will not be mapped to a CorpGroup unless they are also ingested as a root group. Does it makes sense? |
Yes - that makes sense. Thanks for the explanation! |
metadata-ingestion/src/datahub/ingestion/source/identity/azure_ad.py
Outdated
Show resolved
Hide resolved
metadata-ingestion/src/datahub/ingestion/source/identity/azure_ad.py
Outdated
Show resolved
Hide resolved
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Overall this looks really awesome! Just a few minor comments, then we are good to merge.
Looks like lint is failing. You can run |
1ddf934
to
ffb7fe2
Compare
Relates to issue #4367 .
The proposed PR adds support to nested groups in Azure AD, as well as adding a config option to disable logging of filtered out users/groups (see this Slack thread). When dealing with a large Azure AD, many users/groups can be filtered out and the resulting log is very long and useless. Having the possibility to disable that reporting makes the user experience better in my opinion. There might be a better way of doing this as discussed with @dexter-mh-lee . I'm open for feedback.
This PR also:
datahub-frontend
README build instructionsAUTH_OIDC_SCOPE
for Azure AD authenticationconfigure-oidc-react.md
file