Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Idtoken Service Account auth #75

Merged
merged 3 commits into from
Oct 12, 2022
Merged

Idtoken Service Account auth #75

merged 3 commits into from
Oct 12, 2022

Conversation

marcusramberg
Copy link
Contributor

Allow IAP auth through idtoken from service account

The primary usecase for this is when grafana is behind Google Identity Aware Proxy;
This method allows you to use a service account and authenticate programatically towards
IDP, so that you don't need a privileged google account on your public kiosk.

@CLAassistant
Copy link

CLAassistant commented Jun 18, 2022

CLA assistant check
All committers have signed the CLA.

@marcusramberg marcusramberg marked this pull request as ready for review June 19, 2022 10:30
@marcusramberg marcusramberg changed the title feat/service auth Idtoken Service Account auth Jun 20, 2022
@briangann
Copy link
Collaborator

sorry for the delay, let me test this out, looks like a great addition!

@briangann briangann self-assigned this Sep 22, 2022
@briangann briangann added the enhancement New feature or request label Sep 22, 2022
@briangann briangann self-requested a review September 22, 2022 18:24
Copy link
Collaborator

@briangann briangann left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

lgtm, will fix a couple of side-effects due to other commits

@briangann briangann merged commit de05036 into grafana:main Oct 12, 2022
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
enhancement New feature or request
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants