CockroachDB Dedicated is a fully-managed, reserved CockroachDB cluster ideal for a cloud database. We frequently get asked how to set up SSO for the individual CockroachDB Dedicated clusters and we have a detailed tutorial to walk you through that with a local, self-hosted cluster. What was unclear was that you can use the same steps to set up SSO with Dedicated. Based on this detailed document, CockroachDB Dedicated supports OIDC authentication for the DB Console today. In a future release, we are going to bring OIDC integration across the stack. Today, we're going to provide details on how to leverage OIDC specifically with the CockroachDB Dedicated DB Console and Microsoft using the OpenID Connect protocol.
CockroachDB Dedicated is a fully-managed, reserved CockroachDB cluster ideal for a cloud database. We frequently get asked how to set up SSO for the individual CockroachDB Dedicated clusters and we have a detailed tutorial to walk you through that with a local, self-hosted cluster. What was unclear was that you can use the same steps to set up SSO with Dedicated. Based on this detailed document, CockroachDB Dedicated supports OIDC authentication. Today, we're going to provide details on how to leverage OIDC specifically with the Dedicated offering.
High-Level Steps
Provision Dedicated cluster
Configure OAuth Client ID
Configure CockroachDB with the OAuth details
Verify
Step by Step Instructions
Provision Dedicated Cluster
Follow this tutorial to set up a Dedicated cluster.
CockroachDB Dedicated is a fully-managed, reserved CockroachDB cluster ideal for a cloud database. We frequently get asked how to set up SSO for the individual CockroachDB Dedicated clusters and we have a detailed tutorial to walk you through that with a local, self-hosted cluster.
What was unclear was that you can use the same steps to set up SSO with Dedicated. Based on this detailed document, CockroachDB Dedicated supports OIDC authentication. Today, we're going to provide details on how to leverage OIDC specifically with the Dedicated offering and Okta OIDC.
The Red Hat Single Sign-On or just RHSSO is an enterprise version of Keycloak, which is an open-source Identity and Access Management solution aimed at modern applications and services.
In the last few days, I needed to install RHSSO on Openshift version 4.8, however, I needed to implement small customization in the database connection. By default a non-ephemeral RHSSO installation uses an embedded installation of PostgreSQL database, however, I would change the type of database from PostgreSQL to MySQL, and even change the location of this one to the outside of Openshift.
Creating a clean, intuitive user interface is a key part of designing web applications. This has historically been challenging, however, because web apps don’t have a common design language like desktop apps do.
Enter Material Design. Google released Material Design in 2014 with the goal of creating a common user experience across Android devices and web apps. Material design has components that developers can use for both Android and JavaScript applications.
Different applications need different permissions. Although you might have a single resource server providing data to multiple apps, it’s often the case that you don’t want all users of application A to access application B.
In this tutorial, you’ll learn how to use Okta and Spring Boot to implement SSO with two client applications and a single resource server. You’ll also learn how to restrict access to the resource server based on app scores and how to use access policies to enforce authentication and authorization rules.
When large organizations like LinkedIn, Twitter, and Facebook report password hacks, it throws some light on how vulnerable current systems are and why organizations need to implement multi-factor authentication. However, multi-factor authentication is shrouded in myths that may prevent organizations from adopting it.
Here, we have addressed a few of the most common myths surrounding multi-factor authentication.
As more and more of you manage more and more sites via The Hub we’ve got some super big things in the works, starting with single sign on (SSO) goodness.
Take a look through the documentation now or read on for a more narrative version, to ask any questions and all that jazz.
Essentially, if you choose to opt-in, you can now go straight from WPMU DEV to your WordPress admin area, without needing to enter your username or password, saving you vast amounts of time and annoyance.
And we don’t even store your username or password details, so your site is secure and safe.
How Do I Get Started?
Well first up you’ll need to make sure your WPMU DEV Dashboard plugin is up to date (although of course it should already be because you’ve either got it set to auto update or you have Automate set up to take care of that… if you haven’t already then please do!).
Then, in your WP Admin area visit “WPMU DEV > Settings” and turn it on :)
Now, whenever you log into The Hub you’ll be able to jump to the WP Admin area of your site without having to log in.
Is It Safe & Secure?
Absolutely, because we’re using the WPMU DEV Dashboard plugin which securely communicates with WPMU DEV we don’t need to know or save any of your credentials (we do the same with credit cards).
So, while there are absolutely no plans to go there… were we to suffer a security incident then all of your passwords (and payment methods) would be completely safe.
And to be even more secure, you should turn on 2 Factor Authentication (using Google Authenticator) for your WPMU DEV account too, just visit your account page and scroll down a little.
As you know we’ve been working super hard to give you the easiest possible ‘getting started’ experience when you add a new site to WPMU DEV and now, this is an option as part of that :)
All you need to do is tick the box.
What’s Next?
We know it’s taken much longer than a lot of you would have hoped for, but we’re determined to get the next stage of The Hub (2.0) right and this is all part of making that happen – so you should expect to see a whole bunch of features that make managing multiple WP sites vastly easier, quicker and more enjoyable.
Please take a look at the roadmap to find out more and, of course, feel to ask us anything in the comments.