-
Notifications
You must be signed in to change notification settings - Fork 365
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Merge pull request #710 from minrk/azuread
[AzureAD] Support `manage_groups`
- Loading branch information
Showing
3 changed files
with
78 additions
and
1 deletion.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
da8bd36
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Hi yuvipanda can you help me how to configure AzureAdAuthenticator to enable an Azure AD Group to log in Jupyterhub? At the moment I'm able to login with allowed users, enabled manage_groups and I was able to see the "groups" field populated but I did not understand where configure in Jupyterhub which group should have access on and with which permissions (like admin_users and allowed_users..)
I used https://github.com/jupyterhub/helm-chart to deploy Jupyterhub in kubernetes
Below is my configuration
Below the logs
Loading /usr/local/etc/jupyterhub/secret/values.yaml
No config at /usr/local/etc/jupyterhub/existing-secret/values.yaml
[I 2023-12-19 20:31:55.757 JupyterHub app:2859] Running JupyterHub version 4.0.2
[I 2023-12-19 20:31:55.757 JupyterHub app:2889] Using Authenticator: oauthenticator.azuread.AzureAdOAuthenticator-16.2.1
[I 2023-12-19 20:31:55.758 JupyterHub app:2889] Using Spawner: kubespawner.spawner.KubeSpawner-6.2.0
[I 2023-12-19 20:31:55.758 JupyterHub app:2889] Using Proxy: jupyterhub.proxy.ConfigurableHTTPProxy-4.0.2
[I 2023-12-19 20:31:55.812 JupyterHub app:1984] Not using allowed_users. Any authenticated user will be allowed.
[I 2023-12-19 20:31:55.849 JupyterHub reflector:282] watching for pods with label selector='component=singleuser-server' in namespace jupyterhub
[W 2023-12-19 20:31:55.852 JupyterHub _version:37] Single-user server has no version header, which means it is likely < 0.8. Expected 4.0.2
[I 2023-12-19 20:31:55.852 JupyterHub app:2573] amedeo.palopoli still running
[I 2023-12-19 20:31:55.852 JupyterHub app:2928] Initialized 1 spawners in 0.016 seconds
[I 2023-12-19 20:31:55.855 JupyterHub metrics:278] Found 1 active users in the last ActiveUserPeriods.twenty_four_hours
[I 2023-12-19 20:31:55.855 JupyterHub metrics:278] Found 2 active users in the last ActiveUserPeriods.seven_days
[I 2023-12-19 20:31:55.856 JupyterHub metrics:278] Found 2 active users in the last ActiveUserPeriods.thirty_days
[I 2023-12-19 20:31:55.856 JupyterHub app:3142] Not starting proxy
[I 2023-12-19 20:31:55.859 JupyterHub app:3178] Hub API listening on http://:8081/hub/
[I 2023-12-19 20:31:55.859 JupyterHub app:3180] Private Hub API connect url http://hub:8081/hub/
[I 2023-12-19 20:31:55.859 JupyterHub app:3189] Starting managed service jupyterhub-idle-culler
[I 2023-12-19 20:31:55.859 JupyterHub service:385] Starting service 'jupyterhub-idle-culler': ['python3', '-m', 'jupyterhub_idle_culler', '--url=http://localhost:8081/hub/api', '--timeout=3600', '--cull-every=600', '--concurrency=10']
[I 2023-12-19 20:31:55.859 JupyterHub service:133] Spawning python3 -m jupyterhub_idle_culler --url=http://localhost:8081/hub/api --timeout=3600 --cull-every=600 --concurrency=10
I receive 403 and it's saying the user is not allowed even though I put the user in a group Jupyterhub has been receiveing from AAD after user logged in.