

Grafana checks for the presence of a role using the JMESPath specified via the role_attribute_path configuration option.

Grafana determines a user’s email address by querying the OAuth provider until it finds an e-mail address: By default, Grafana uses user:email as scope. Set empty_scopes to true to use an empty scope during authentication. You should only use this for testing, because this mode leaves SSL/TLS susceptible to man-in-the-middle attacks. If it is true, then SSL/TLS accepts any certificate presented by the server and any host name in that certificate. Tls_skip_verify_insecure controls whether a client verifies the server’s certificate chain and host name. Set tls_client_ca to the path containing a trusted certificate authority list.Set tls_client_key to the path containing the key.Set tls_client_cert to the path of the certificate.You can also specify the SSL/TLS configuration used by the client.

Set api_url to the resource that returns OpenID UserInfo compatible information. For example in case you are serving Grafana behind a proxy.Īllowed_domains = You may have to set the root_url option of for the callback URL to beĬorrect.
#Front mission 2089 farming full
This callback URL must match the full HTTP address that you use in your browser to access Grafana, but with the suffixed path of /login/generic_oauth. You can configure many different OAuth2 authentication services with Grafana using the generic OAuth2 feature. OAuth authentication Generic OAuth authentication
