You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
We're trying to move to a hub setup where the initial hub setup is 'standard', and then we have an issue about post setup customizations.
This is the one for Earthscope.
✅ Auth0 Authentication
They'd like to use auth0 for authentication, because that is what the rest of their infrastructure uses.
Status: Done, with Auth0OAuthenticator. #3883 turns that into using the GenericOAuthenticator instead, so we don't have to support Auth0 specifically, but just treat it as an OAuth2 provider.
✅ Passing Auth0 token through to user environment
After authentication, they'd like the auth token + refresh token passed through to the user environment as environment variables. This allows users to talk to various APIs with that authentication token
. Should eventually be generalized to allow passing arbitrary information for arbitrary hubs from auth_state to the user environment, but not necessarily right now.
✅ Allow users access based on particular scopes they are granted
Not everyone who can login with auth0 should be able to access the hub - it needs to be controlled via a specific scope granted to them. All users with @2i2c.org email addresses are automatically granted this for debugging.
Tag all resources 2i2c creates in their AWS account
They'd like us to set an appropriate AWS tag for all the resources we manage in their AWS account, so it is easier to account for cloud spend. Note this doesn't include any per user tagging or similar - we have indicated to them that this is not something we can support right now.
We're trying to move to a hub setup where the initial hub setup is 'standard', and then we have an issue about post setup customizations.
This is the one for Earthscope.
✅ Auth0 Authentication
They'd like to use auth0 for authentication, because that is what the rest of their infrastructure uses.
Status: Done, with
Auth0OAuthenticator
. #3883 turns that into using the GenericOAuthenticator instead, so we don't have to support Auth0 specifically, but just treat it as an OAuth2 provider.✅ Passing Auth0 token through to user environment
After authentication, they'd like the auth token + refresh token passed through to the user environment as environment variables. This allows users to talk to various APIs with that authentication token
Status: Done, via
infrastructure/config/clusters/earthscope/common.values.yaml
Line 102 in 120e88d
✅ Allow users access based on particular scopes they are granted
Not everyone who can login with auth0 should be able to access the hub - it needs to be controlled via a specific scope granted to them. All users with
@2i2c.org
email addresses are automatically granted this for debugging.Status: Done, via
infrastructure/config/clusters/earthscope/common.values.yaml
Line 44 in 120e88d
✅ Restrict access to profiles options based on granted scopes
Not all profile options should be available to everyone - this should be limited based on scopes granted to them.
Status: Committed, specced out in #3900. To be scheduled.
Restrict access to dask-gateway based on granted scopes
Not all users should be able to get access to dask-gateway - this should also be limited based on scopes granted to them.
Status: Committed, to be spec'd and scheduled.
Related requests: #4014
Tag all resources 2i2c creates in their AWS account
They'd like us to set an appropriate AWS tag for all the resources we manage in their AWS account, so it is easier to account for cloud spend. Note this doesn't include any per user tagging or similar - we have indicated to them that this is not something we can support right now.
Status: Committed
Related requests: #4149
The text was updated successfully, but these errors were encountered: