This is an automated email from the ASF dual-hosted git repository.
github-bot pushed a commit to branch asf-site
in repository https://gitbox.apache.org/repos/asf/dolphinscheduler-website.git
The following commit(s) were added to refs/heads/asf-site by this push:
new e70bc4ed55 Automated deployment:
cf6f3f14684149ec594108d81ec4859abae9115d
e70bc4ed55 is described below
commit e70bc4ed55bf64103504aaed32713fd2bf757a65
Author: github-actions[bot] <github-actions[bot]@users.noreply.github.com>
AuthorDate: Mon Oct 20 05:07:21 2025 +0000
Automated deployment: cf6f3f14684149ec594108d81ec4859abae9115d
---
data/doc/en-us.json | 4 +-
.../contribute/development-environment-setup.json | 2 +-
.../dev/guide/security/authentication-type.json | 710 ++++++++++++++++++++-
python/2.0.5/.buildinfo | 2 +-
python/2.0.6/.buildinfo | 2 +-
python/2.0.7/.buildinfo | 2 +-
python/3.0.0/.buildinfo | 2 +-
python/3.0.1/.buildinfo | 2 +-
python/3.1.0/.buildinfo | 2 +-
python/4.0.0/.buildinfo | 2 +-
python/4.0.1/.buildinfo | 2 +-
python/4.0.2/.buildinfo | 2 +-
python/4.0.3/.buildinfo | 2 +-
python/4.0.4/.buildinfo | 2 +-
python/4.1.0/.buildinfo | 2 +-
python/main/.buildinfo | 2 +-
16 files changed, 707 insertions(+), 35 deletions(-)
diff --git a/data/doc/en-us.json b/data/doc/en-us.json
index c31c47839c..5ab499b331 100644
--- a/data/doc/en-us.json
+++ b/data/doc/en-us.json
@@ -39006,7 +39006,7 @@
]
},
{
- "content": "Authentication Type\n\nSo far we support four authentication
types, Apache DolphinScheduler password, LDAP, Casdoor SSO and OAuth2,the
OAuth2 authorization login mode can be used with other authentication
modes.\n\nChange Authentication
Type\n\ndolphinscheduler-api/src/main/resources/application.yaml\n\nsecurity:\n
authentication:\n # Authentication types (supported types:
PASSWORD,LDAP,CASDOOR_SSO)\n type: LDAP\n # IF you set type `LDAP`, below
config will be e [...]
+ "content": "Authentication Type\n\nSo far we support four authentication
types, Apache DolphinScheduler password, LDAP, Casdoor SSO, OAuth2, and OIDC
(OpenID Connect). The OAuth2 authorization login mode can be used with other
authentication modes.\n\nChange Authentication
Type\n\ndolphinscheduler-api/src/main/resources/application.yaml\n\nsecurity:\n
authentication:\n # Authentication types (supported types:
PASSWORD,LDAP,CASDOOR_SSO, OIDC)\n type: LDAP\n # IF you set type [...]
"version": "dev",
"link": "/guide/security/authentication-type",
"title": "Authentication Type",
@@ -39407,7 +39407,7 @@
]
},
{
- "content": "DolphinScheduler development\nSoftware Requirements\nBefore
setting up the DolphinScheduler development environment, please make sure you
have installed the software as below:\n\nGit\nJDK: v1.8+\nMaven: v3.5+\nNode:
v16.0+\nPnpm: v8.0+ (Make sure pnpm is compatible with Node.js, see also:
Compatibility)\n\nClone Git Repository\nDownload the git repository through
your git management tool, here we use git-core as an example\nmkdir
dolphinscheduler\ncd dolphinscheduler\ngit [...]
+ "content": "DolphinScheduler development\nSoftware Requirements\nBefore
setting up the DolphinScheduler development environment, please make sure you
have installed the software as below:\n\nGit\nJDK: v1.8+\nMaven: v3.5+\nNode:
v16.0+\nPnpm: v8.0+ (Make sure pnpm is compatible with Node.js, see also:
Compatibility)\n\nClone Git Repository\nDownload the git repository through
your git management tool, here we use git-core as an example\nmkdir
dolphinscheduler\ncd dolphinscheduler\ngit [...]
"version": "dev",
"link": "/contribute/development-environment-setup",
"title": "DolphinScheduler development",
diff --git a/pages/doc/en-us/dev/contribute/development-environment-setup.json
b/pages/doc/en-us/dev/contribute/development-environment-setup.json
index b51c0c1c91..7dc90f5b1d 100644
--- a/pages/doc/en-us/dev/contribute/development-environment-setup.json
+++ b/pages/doc/en-us/dev/contribute/development-environment-setup.json
@@ -1,5 +1,5 @@
{
- "__html": "<h1 id=\"dolphinscheduler-development\">DolphinScheduler
development</h1>\n<h2 id=\"software-requirements\">Software
Requirements</h2>\n<p>Before setting up the DolphinScheduler development
environment, please make sure you have installed the software as
below:</p>\n<ul>\n<li><a
href=\"https://git-scm.com/downloads\">Git</a></li>\n<li><a
href=\"https://www.oracle.com/technetwork/java/javase/downloads/index.html\">JDK</a>:
v1.8+</li>\n<li><a href=\"http://maven.apache.org/dow [...]
+ "__html": "<h1 id=\"dolphinscheduler-development\">DolphinScheduler
development</h1>\n<h2 id=\"software-requirements\">Software
Requirements</h2>\n<p>Before setting up the DolphinScheduler development
environment, please make sure you have installed the software as
below:</p>\n<ul>\n<li><a
href=\"https://git-scm.com/downloads\">Git</a></li>\n<li><a
href=\"https://www.oracle.com/technetwork/java/javase/downloads/index.html\">JDK</a>:
v1.8+</li>\n<li><a href=\"http://maven.apache.org/dow [...]
"location": [
"Contribution",
"Development Environment Setup"
diff --git a/pages/doc/en-us/dev/guide/security/authentication-type.json
b/pages/doc/en-us/dev/guide/security/authentication-type.json
index 4f93a9a088..e82d785429 100644
--- a/pages/doc/en-us/dev/guide/security/authentication-type.json
+++ b/pages/doc/en-us/dev/guide/security/authentication-type.json
@@ -1,5 +1,5 @@
{
- "__html": "<h1 id=\"authentication-type\">Authentication
Type</h1>\n<ul>\n<li>So far we support four authentication types, Apache
DolphinScheduler password, LDAP, Casdoor SSO and OAuth2,the OAuth2
authorization login mode can be used with other authentication
modes.</li>\n</ul>\n<h2 id=\"change-authentication-type\">Change Authentication
Type</h2>\n<blockquote>\n<p>dolphinscheduler-api/src/main/resources/application.yaml</p>\n</blockquote>\n<pre><code
class=\"language-yaml\"><span clas [...]
+ "__html": "<h1 id=\"authentication-type\">Authentication
Type</h1>\n<ul>\n<li>So far we support four authentication types, Apache
DolphinScheduler password, LDAP, Casdoor SSO, OAuth2, and OIDC (OpenID
Connect). The OAuth2 authorization login mode can be used with other
authentication modes.</li>\n</ul>\n<h2 id=\"change-authentication-type\">Change
Authentication
Type</h2>\n<blockquote>\n<p>dolphinscheduler-api/src/main/resources/application.yaml</p>\n</blockquote>\n<pre><code
class=\"l [...]
"location": [
"Introduction to Functions",
"Security",
@@ -11,33 +11,192 @@
"children": [
{
"title": "Step1. Deploy Casdoor",
- "children": [],
+ "children": [
+ {
+ "title": "2.1. Easy setup using Pre-configured Realm Export:",
+ "children": [],
+ "anchor": "2.1.-easy-setup-using-pre-configured-realm-export:"
+ },
+ {
+ "title": "2.2. Using Custom configuration:",
+ "children": [],
+ "anchor": "2.2.-using-custom-configuration:"
+ },
+ {
+ "title": "2.3. If you have existing OIDC provider (Okta, Azure
AD, Google, etc.)",
+ "children": [],
+ "anchor":
"2.3.-if-you-have-existing-oidc-provider-(okta,-azure-ad,-google,-etc.)"
+ }
+ ],
"anchor": "step1.-deploy-casdoor"
},
{
"title": "Step2. Configure Casdoor Application",
- "children": [],
+ "children": [
+ {
+ "title": "2.1. Easy setup using Pre-configured Realm Export:",
+ "children": [],
+ "anchor": "2.1.-easy-setup-using-pre-configured-realm-export:"
+ },
+ {
+ "title": "2.2. Using Custom configuration:",
+ "children": [],
+ "anchor": "2.2.-using-custom-configuration:"
+ },
+ {
+ "title": "2.3. If you have existing OIDC provider (Okta, Azure
AD, Google, etc.)",
+ "children": [],
+ "anchor":
"2.3.-if-you-have-existing-oidc-provider-(okta,-azure-ad,-google,-etc.)"
+ }
+ ],
"anchor": "step2.-configure-casdoor-application"
},
{
"title": "Step3. Configure Dolphinscheduler",
- "children": [],
+ "children": [
+ {
+ "title": "2.1. Easy setup using Pre-configured Realm Export:",
+ "children": [],
+ "anchor": "2.1.-easy-setup-using-pre-configured-realm-export:"
+ },
+ {
+ "title": "2.2. Using Custom configuration:",
+ "children": [],
+ "anchor": "2.2.-using-custom-configuration:"
+ },
+ {
+ "title": "2.3. If you have existing OIDC provider (Okta, Azure
AD, Google, etc.)",
+ "children": [],
+ "anchor":
"2.3.-if-you-have-existing-oidc-provider-(okta,-azure-ad,-google,-etc.)"
+ }
+ ],
"anchor": "step3.-configure-dolphinscheduler"
},
{
"title": "Step1. Create Client Credentials",
- "children": [],
+ "children": [
+ {
+ "title": "2.1. Easy setup using Pre-configured Realm Export:",
+ "children": [],
+ "anchor": "2.1.-easy-setup-using-pre-configured-realm-export:"
+ },
+ {
+ "title": "2.2. Using Custom configuration:",
+ "children": [],
+ "anchor": "2.2.-using-custom-configuration:"
+ },
+ {
+ "title": "2.3. If you have existing OIDC provider (Okta, Azure
AD, Google, etc.)",
+ "children": [],
+ "anchor":
"2.3.-if-you-have-existing-oidc-provider-(okta,-azure-ad,-google,-etc.)"
+ }
+ ],
"anchor": "step1.-create-client-credentials"
},
{
"title": "Step2.Enable OAuth2 Login In The Api's Configuration File",
- "children": [],
+ "children": [
+ {
+ "title": "2.1. Easy setup using Pre-configured Realm Export:",
+ "children": [],
+ "anchor": "2.1.-easy-setup-using-pre-configured-realm-export:"
+ },
+ {
+ "title": "2.2. Using Custom configuration:",
+ "children": [],
+ "anchor": "2.2.-using-custom-configuration:"
+ },
+ {
+ "title": "2.3. If you have existing OIDC provider (Okta, Azure
AD, Google, etc.)",
+ "children": [],
+ "anchor":
"2.3.-if-you-have-existing-oidc-provider-(okta,-azure-ad,-google,-etc.)"
+ }
+ ],
"anchor": "step2.enable-oauth2-login-in-the-api's-configuration-file"
},
{
"title": "Step.3 Login With OAuth2",
- "children": [],
+ "children": [
+ {
+ "title": "2.1. Easy setup using Pre-configured Realm Export:",
+ "children": [],
+ "anchor": "2.1.-easy-setup-using-pre-configured-realm-export:"
+ },
+ {
+ "title": "2.2. Using Custom configuration:",
+ "children": [],
+ "anchor": "2.2.-using-custom-configuration:"
+ },
+ {
+ "title": "2.3. If you have existing OIDC provider (Okta, Azure
AD, Google, etc.)",
+ "children": [],
+ "anchor":
"2.3.-if-you-have-existing-oidc-provider-(okta,-azure-ad,-google,-etc.)"
+ }
+ ],
"anchor": "step.3-login-with-oauth2"
+ },
+ {
+ "title": "Step 1. Enable OIDC in the API's Configuration File",
+ "children": [
+ {
+ "title": "2.1. Easy setup using Pre-configured Realm Export:",
+ "children": [],
+ "anchor": "2.1.-easy-setup-using-pre-configured-realm-export:"
+ },
+ {
+ "title": "2.2. Using Custom configuration:",
+ "children": [],
+ "anchor": "2.2.-using-custom-configuration:"
+ },
+ {
+ "title": "2.3. If you have existing OIDC provider (Okta, Azure
AD, Google, etc.)",
+ "children": [],
+ "anchor":
"2.3.-if-you-have-existing-oidc-provider-(okta,-azure-ad,-google,-etc.)"
+ }
+ ],
+ "anchor": "step-1.-enable-oidc-in-the-api's-configuration-file"
+ },
+ {
+ "title": "Step 2. Configure Your OIDC Provider (Keycloak Example)",
+ "children": [
+ {
+ "title": "2.1. Easy setup using Pre-configured Realm Export:",
+ "children": [],
+ "anchor": "2.1.-easy-setup-using-pre-configured-realm-export:"
+ },
+ {
+ "title": "2.2. Using Custom configuration:",
+ "children": [],
+ "anchor": "2.2.-using-custom-configuration:"
+ },
+ {
+ "title": "2.3. If you have existing OIDC provider (Okta, Azure
AD, Google, etc.)",
+ "children": [],
+ "anchor":
"2.3.-if-you-have-existing-oidc-provider-(okta,-azure-ad,-google,-etc.)"
+ }
+ ],
+ "anchor": "step-2.-configure-your-oidc-provider-(keycloak-example)"
+ },
+ {
+ "title": "Step 3. Login with OIDC",
+ "children": [
+ {
+ "title": "2.1. Easy setup using Pre-configured Realm Export:",
+ "children": [],
+ "anchor": "2.1.-easy-setup-using-pre-configured-realm-export:"
+ },
+ {
+ "title": "2.2. Using Custom configuration:",
+ "children": [],
+ "anchor": "2.2.-using-custom-configuration:"
+ },
+ {
+ "title": "2.3. If you have existing OIDC provider (Okta, Azure
AD, Google, etc.)",
+ "children": [],
+ "anchor":
"2.3.-if-you-have-existing-oidc-provider-(okta,-azure-ad,-google,-etc.)"
+ }
+ ],
+ "anchor": "step-3.-login-with-oidc"
}
],
"anchor": "change-authentication-type"
@@ -47,33 +206,192 @@
"children": [
{
"title": "Step1. Deploy Casdoor",
- "children": [],
+ "children": [
+ {
+ "title": "2.1. Easy setup using Pre-configured Realm Export:",
+ "children": [],
+ "anchor": "2.1.-easy-setup-using-pre-configured-realm-export:"
+ },
+ {
+ "title": "2.2. Using Custom configuration:",
+ "children": [],
+ "anchor": "2.2.-using-custom-configuration:"
+ },
+ {
+ "title": "2.3. If you have existing OIDC provider (Okta, Azure
AD, Google, etc.)",
+ "children": [],
+ "anchor":
"2.3.-if-you-have-existing-oidc-provider-(okta,-azure-ad,-google,-etc.)"
+ }
+ ],
"anchor": "step1.-deploy-casdoor"
},
{
"title": "Step2. Configure Casdoor Application",
- "children": [],
+ "children": [
+ {
+ "title": "2.1. Easy setup using Pre-configured Realm Export:",
+ "children": [],
+ "anchor": "2.1.-easy-setup-using-pre-configured-realm-export:"
+ },
+ {
+ "title": "2.2. Using Custom configuration:",
+ "children": [],
+ "anchor": "2.2.-using-custom-configuration:"
+ },
+ {
+ "title": "2.3. If you have existing OIDC provider (Okta, Azure
AD, Google, etc.)",
+ "children": [],
+ "anchor":
"2.3.-if-you-have-existing-oidc-provider-(okta,-azure-ad,-google,-etc.)"
+ }
+ ],
"anchor": "step2.-configure-casdoor-application"
},
{
"title": "Step3. Configure Dolphinscheduler",
- "children": [],
+ "children": [
+ {
+ "title": "2.1. Easy setup using Pre-configured Realm Export:",
+ "children": [],
+ "anchor": "2.1.-easy-setup-using-pre-configured-realm-export:"
+ },
+ {
+ "title": "2.2. Using Custom configuration:",
+ "children": [],
+ "anchor": "2.2.-using-custom-configuration:"
+ },
+ {
+ "title": "2.3. If you have existing OIDC provider (Okta, Azure
AD, Google, etc.)",
+ "children": [],
+ "anchor":
"2.3.-if-you-have-existing-oidc-provider-(okta,-azure-ad,-google,-etc.)"
+ }
+ ],
"anchor": "step3.-configure-dolphinscheduler"
},
{
"title": "Step1. Create Client Credentials",
- "children": [],
+ "children": [
+ {
+ "title": "2.1. Easy setup using Pre-configured Realm Export:",
+ "children": [],
+ "anchor": "2.1.-easy-setup-using-pre-configured-realm-export:"
+ },
+ {
+ "title": "2.2. Using Custom configuration:",
+ "children": [],
+ "anchor": "2.2.-using-custom-configuration:"
+ },
+ {
+ "title": "2.3. If you have existing OIDC provider (Okta, Azure
AD, Google, etc.)",
+ "children": [],
+ "anchor":
"2.3.-if-you-have-existing-oidc-provider-(okta,-azure-ad,-google,-etc.)"
+ }
+ ],
"anchor": "step1.-create-client-credentials"
},
{
"title": "Step2.Enable OAuth2 Login In The Api's Configuration File",
- "children": [],
+ "children": [
+ {
+ "title": "2.1. Easy setup using Pre-configured Realm Export:",
+ "children": [],
+ "anchor": "2.1.-easy-setup-using-pre-configured-realm-export:"
+ },
+ {
+ "title": "2.2. Using Custom configuration:",
+ "children": [],
+ "anchor": "2.2.-using-custom-configuration:"
+ },
+ {
+ "title": "2.3. If you have existing OIDC provider (Okta, Azure
AD, Google, etc.)",
+ "children": [],
+ "anchor":
"2.3.-if-you-have-existing-oidc-provider-(okta,-azure-ad,-google,-etc.)"
+ }
+ ],
"anchor": "step2.enable-oauth2-login-in-the-api's-configuration-file"
},
{
"title": "Step.3 Login With OAuth2",
- "children": [],
+ "children": [
+ {
+ "title": "2.1. Easy setup using Pre-configured Realm Export:",
+ "children": [],
+ "anchor": "2.1.-easy-setup-using-pre-configured-realm-export:"
+ },
+ {
+ "title": "2.2. Using Custom configuration:",
+ "children": [],
+ "anchor": "2.2.-using-custom-configuration:"
+ },
+ {
+ "title": "2.3. If you have existing OIDC provider (Okta, Azure
AD, Google, etc.)",
+ "children": [],
+ "anchor":
"2.3.-if-you-have-existing-oidc-provider-(okta,-azure-ad,-google,-etc.)"
+ }
+ ],
"anchor": "step.3-login-with-oauth2"
+ },
+ {
+ "title": "Step 1. Enable OIDC in the API's Configuration File",
+ "children": [
+ {
+ "title": "2.1. Easy setup using Pre-configured Realm Export:",
+ "children": [],
+ "anchor": "2.1.-easy-setup-using-pre-configured-realm-export:"
+ },
+ {
+ "title": "2.2. Using Custom configuration:",
+ "children": [],
+ "anchor": "2.2.-using-custom-configuration:"
+ },
+ {
+ "title": "2.3. If you have existing OIDC provider (Okta, Azure
AD, Google, etc.)",
+ "children": [],
+ "anchor":
"2.3.-if-you-have-existing-oidc-provider-(okta,-azure-ad,-google,-etc.)"
+ }
+ ],
+ "anchor": "step-1.-enable-oidc-in-the-api's-configuration-file"
+ },
+ {
+ "title": "Step 2. Configure Your OIDC Provider (Keycloak Example)",
+ "children": [
+ {
+ "title": "2.1. Easy setup using Pre-configured Realm Export:",
+ "children": [],
+ "anchor": "2.1.-easy-setup-using-pre-configured-realm-export:"
+ },
+ {
+ "title": "2.2. Using Custom configuration:",
+ "children": [],
+ "anchor": "2.2.-using-custom-configuration:"
+ },
+ {
+ "title": "2.3. If you have existing OIDC provider (Okta, Azure
AD, Google, etc.)",
+ "children": [],
+ "anchor":
"2.3.-if-you-have-existing-oidc-provider-(okta,-azure-ad,-google,-etc.)"
+ }
+ ],
+ "anchor": "step-2.-configure-your-oidc-provider-(keycloak-example)"
+ },
+ {
+ "title": "Step 3. Login with OIDC",
+ "children": [
+ {
+ "title": "2.1. Easy setup using Pre-configured Realm Export:",
+ "children": [],
+ "anchor": "2.1.-easy-setup-using-pre-configured-realm-export:"
+ },
+ {
+ "title": "2.2. Using Custom configuration:",
+ "children": [],
+ "anchor": "2.2.-using-custom-configuration:"
+ },
+ {
+ "title": "2.3. If you have existing OIDC provider (Okta, Azure
AD, Google, etc.)",
+ "children": [],
+ "anchor":
"2.3.-if-you-have-existing-oidc-provider-(okta,-azure-ad,-google,-etc.)"
+ }
+ ],
+ "anchor": "step-3.-login-with-oidc"
}
],
"anchor": "casdoor-sso"
@@ -83,36 +401,390 @@
"children": [
{
"title": "Step1. Deploy Casdoor",
- "children": [],
+ "children": [
+ {
+ "title": "2.1. Easy setup using Pre-configured Realm Export:",
+ "children": [],
+ "anchor": "2.1.-easy-setup-using-pre-configured-realm-export:"
+ },
+ {
+ "title": "2.2. Using Custom configuration:",
+ "children": [],
+ "anchor": "2.2.-using-custom-configuration:"
+ },
+ {
+ "title": "2.3. If you have existing OIDC provider (Okta, Azure
AD, Google, etc.)",
+ "children": [],
+ "anchor":
"2.3.-if-you-have-existing-oidc-provider-(okta,-azure-ad,-google,-etc.)"
+ }
+ ],
"anchor": "step1.-deploy-casdoor"
},
{
"title": "Step2. Configure Casdoor Application",
- "children": [],
+ "children": [
+ {
+ "title": "2.1. Easy setup using Pre-configured Realm Export:",
+ "children": [],
+ "anchor": "2.1.-easy-setup-using-pre-configured-realm-export:"
+ },
+ {
+ "title": "2.2. Using Custom configuration:",
+ "children": [],
+ "anchor": "2.2.-using-custom-configuration:"
+ },
+ {
+ "title": "2.3. If you have existing OIDC provider (Okta, Azure
AD, Google, etc.)",
+ "children": [],
+ "anchor":
"2.3.-if-you-have-existing-oidc-provider-(okta,-azure-ad,-google,-etc.)"
+ }
+ ],
"anchor": "step2.-configure-casdoor-application"
},
{
"title": "Step3. Configure Dolphinscheduler",
- "children": [],
+ "children": [
+ {
+ "title": "2.1. Easy setup using Pre-configured Realm Export:",
+ "children": [],
+ "anchor": "2.1.-easy-setup-using-pre-configured-realm-export:"
+ },
+ {
+ "title": "2.2. Using Custom configuration:",
+ "children": [],
+ "anchor": "2.2.-using-custom-configuration:"
+ },
+ {
+ "title": "2.3. If you have existing OIDC provider (Okta, Azure
AD, Google, etc.)",
+ "children": [],
+ "anchor":
"2.3.-if-you-have-existing-oidc-provider-(okta,-azure-ad,-google,-etc.)"
+ }
+ ],
"anchor": "step3.-configure-dolphinscheduler"
},
{
"title": "Step1. Create Client Credentials",
- "children": [],
+ "children": [
+ {
+ "title": "2.1. Easy setup using Pre-configured Realm Export:",
+ "children": [],
+ "anchor": "2.1.-easy-setup-using-pre-configured-realm-export:"
+ },
+ {
+ "title": "2.2. Using Custom configuration:",
+ "children": [],
+ "anchor": "2.2.-using-custom-configuration:"
+ },
+ {
+ "title": "2.3. If you have existing OIDC provider (Okta, Azure
AD, Google, etc.)",
+ "children": [],
+ "anchor":
"2.3.-if-you-have-existing-oidc-provider-(okta,-azure-ad,-google,-etc.)"
+ }
+ ],
"anchor": "step1.-create-client-credentials"
},
{
"title": "Step2.Enable OAuth2 Login In The Api's Configuration File",
- "children": [],
+ "children": [
+ {
+ "title": "2.1. Easy setup using Pre-configured Realm Export:",
+ "children": [],
+ "anchor": "2.1.-easy-setup-using-pre-configured-realm-export:"
+ },
+ {
+ "title": "2.2. Using Custom configuration:",
+ "children": [],
+ "anchor": "2.2.-using-custom-configuration:"
+ },
+ {
+ "title": "2.3. If you have existing OIDC provider (Okta, Azure
AD, Google, etc.)",
+ "children": [],
+ "anchor":
"2.3.-if-you-have-existing-oidc-provider-(okta,-azure-ad,-google,-etc.)"
+ }
+ ],
"anchor": "step2.enable-oauth2-login-in-the-api's-configuration-file"
},
{
"title": "Step.3 Login With OAuth2",
- "children": [],
+ "children": [
+ {
+ "title": "2.1. Easy setup using Pre-configured Realm Export:",
+ "children": [],
+ "anchor": "2.1.-easy-setup-using-pre-configured-realm-export:"
+ },
+ {
+ "title": "2.2. Using Custom configuration:",
+ "children": [],
+ "anchor": "2.2.-using-custom-configuration:"
+ },
+ {
+ "title": "2.3. If you have existing OIDC provider (Okta, Azure
AD, Google, etc.)",
+ "children": [],
+ "anchor":
"2.3.-if-you-have-existing-oidc-provider-(okta,-azure-ad,-google,-etc.)"
+ }
+ ],
"anchor": "step.3-login-with-oauth2"
+ },
+ {
+ "title": "Step 1. Enable OIDC in the API's Configuration File",
+ "children": [
+ {
+ "title": "2.1. Easy setup using Pre-configured Realm Export:",
+ "children": [],
+ "anchor": "2.1.-easy-setup-using-pre-configured-realm-export:"
+ },
+ {
+ "title": "2.2. Using Custom configuration:",
+ "children": [],
+ "anchor": "2.2.-using-custom-configuration:"
+ },
+ {
+ "title": "2.3. If you have existing OIDC provider (Okta, Azure
AD, Google, etc.)",
+ "children": [],
+ "anchor":
"2.3.-if-you-have-existing-oidc-provider-(okta,-azure-ad,-google,-etc.)"
+ }
+ ],
+ "anchor": "step-1.-enable-oidc-in-the-api's-configuration-file"
+ },
+ {
+ "title": "Step 2. Configure Your OIDC Provider (Keycloak Example)",
+ "children": [
+ {
+ "title": "2.1. Easy setup using Pre-configured Realm Export:",
+ "children": [],
+ "anchor": "2.1.-easy-setup-using-pre-configured-realm-export:"
+ },
+ {
+ "title": "2.2. Using Custom configuration:",
+ "children": [],
+ "anchor": "2.2.-using-custom-configuration:"
+ },
+ {
+ "title": "2.3. If you have existing OIDC provider (Okta, Azure
AD, Google, etc.)",
+ "children": [],
+ "anchor":
"2.3.-if-you-have-existing-oidc-provider-(okta,-azure-ad,-google,-etc.)"
+ }
+ ],
+ "anchor": "step-2.-configure-your-oidc-provider-(keycloak-example)"
+ },
+ {
+ "title": "Step 3. Login with OIDC",
+ "children": [
+ {
+ "title": "2.1. Easy setup using Pre-configured Realm Export:",
+ "children": [],
+ "anchor": "2.1.-easy-setup-using-pre-configured-realm-export:"
+ },
+ {
+ "title": "2.2. Using Custom configuration:",
+ "children": [],
+ "anchor": "2.2.-using-custom-configuration:"
+ },
+ {
+ "title": "2.3. If you have existing OIDC provider (Okta, Azure
AD, Google, etc.)",
+ "children": [],
+ "anchor":
"2.3.-if-you-have-existing-oidc-provider-(okta,-azure-ad,-google,-etc.)"
+ }
+ ],
+ "anchor": "step-3.-login-with-oidc"
}
],
"anchor": "oauth2"
+ },
+ {
+ "title": "OIDC (OpenID Connect)",
+ "children": [
+ {
+ "title": "Step1. Deploy Casdoor",
+ "children": [
+ {
+ "title": "2.1. Easy setup using Pre-configured Realm Export:",
+ "children": [],
+ "anchor": "2.1.-easy-setup-using-pre-configured-realm-export:"
+ },
+ {
+ "title": "2.2. Using Custom configuration:",
+ "children": [],
+ "anchor": "2.2.-using-custom-configuration:"
+ },
+ {
+ "title": "2.3. If you have existing OIDC provider (Okta, Azure
AD, Google, etc.)",
+ "children": [],
+ "anchor":
"2.3.-if-you-have-existing-oidc-provider-(okta,-azure-ad,-google,-etc.)"
+ }
+ ],
+ "anchor": "step1.-deploy-casdoor"
+ },
+ {
+ "title": "Step2. Configure Casdoor Application",
+ "children": [
+ {
+ "title": "2.1. Easy setup using Pre-configured Realm Export:",
+ "children": [],
+ "anchor": "2.1.-easy-setup-using-pre-configured-realm-export:"
+ },
+ {
+ "title": "2.2. Using Custom configuration:",
+ "children": [],
+ "anchor": "2.2.-using-custom-configuration:"
+ },
+ {
+ "title": "2.3. If you have existing OIDC provider (Okta, Azure
AD, Google, etc.)",
+ "children": [],
+ "anchor":
"2.3.-if-you-have-existing-oidc-provider-(okta,-azure-ad,-google,-etc.)"
+ }
+ ],
+ "anchor": "step2.-configure-casdoor-application"
+ },
+ {
+ "title": "Step3. Configure Dolphinscheduler",
+ "children": [
+ {
+ "title": "2.1. Easy setup using Pre-configured Realm Export:",
+ "children": [],
+ "anchor": "2.1.-easy-setup-using-pre-configured-realm-export:"
+ },
+ {
+ "title": "2.2. Using Custom configuration:",
+ "children": [],
+ "anchor": "2.2.-using-custom-configuration:"
+ },
+ {
+ "title": "2.3. If you have existing OIDC provider (Okta, Azure
AD, Google, etc.)",
+ "children": [],
+ "anchor":
"2.3.-if-you-have-existing-oidc-provider-(okta,-azure-ad,-google,-etc.)"
+ }
+ ],
+ "anchor": "step3.-configure-dolphinscheduler"
+ },
+ {
+ "title": "Step1. Create Client Credentials",
+ "children": [
+ {
+ "title": "2.1. Easy setup using Pre-configured Realm Export:",
+ "children": [],
+ "anchor": "2.1.-easy-setup-using-pre-configured-realm-export:"
+ },
+ {
+ "title": "2.2. Using Custom configuration:",
+ "children": [],
+ "anchor": "2.2.-using-custom-configuration:"
+ },
+ {
+ "title": "2.3. If you have existing OIDC provider (Okta, Azure
AD, Google, etc.)",
+ "children": [],
+ "anchor":
"2.3.-if-you-have-existing-oidc-provider-(okta,-azure-ad,-google,-etc.)"
+ }
+ ],
+ "anchor": "step1.-create-client-credentials"
+ },
+ {
+ "title": "Step2.Enable OAuth2 Login In The Api's Configuration File",
+ "children": [
+ {
+ "title": "2.1. Easy setup using Pre-configured Realm Export:",
+ "children": [],
+ "anchor": "2.1.-easy-setup-using-pre-configured-realm-export:"
+ },
+ {
+ "title": "2.2. Using Custom configuration:",
+ "children": [],
+ "anchor": "2.2.-using-custom-configuration:"
+ },
+ {
+ "title": "2.3. If you have existing OIDC provider (Okta, Azure
AD, Google, etc.)",
+ "children": [],
+ "anchor":
"2.3.-if-you-have-existing-oidc-provider-(okta,-azure-ad,-google,-etc.)"
+ }
+ ],
+ "anchor": "step2.enable-oauth2-login-in-the-api's-configuration-file"
+ },
+ {
+ "title": "Step.3 Login With OAuth2",
+ "children": [
+ {
+ "title": "2.1. Easy setup using Pre-configured Realm Export:",
+ "children": [],
+ "anchor": "2.1.-easy-setup-using-pre-configured-realm-export:"
+ },
+ {
+ "title": "2.2. Using Custom configuration:",
+ "children": [],
+ "anchor": "2.2.-using-custom-configuration:"
+ },
+ {
+ "title": "2.3. If you have existing OIDC provider (Okta, Azure
AD, Google, etc.)",
+ "children": [],
+ "anchor":
"2.3.-if-you-have-existing-oidc-provider-(okta,-azure-ad,-google,-etc.)"
+ }
+ ],
+ "anchor": "step.3-login-with-oauth2"
+ },
+ {
+ "title": "Step 1. Enable OIDC in the API's Configuration File",
+ "children": [
+ {
+ "title": "2.1. Easy setup using Pre-configured Realm Export:",
+ "children": [],
+ "anchor": "2.1.-easy-setup-using-pre-configured-realm-export:"
+ },
+ {
+ "title": "2.2. Using Custom configuration:",
+ "children": [],
+ "anchor": "2.2.-using-custom-configuration:"
+ },
+ {
+ "title": "2.3. If you have existing OIDC provider (Okta, Azure
AD, Google, etc.)",
+ "children": [],
+ "anchor":
"2.3.-if-you-have-existing-oidc-provider-(okta,-azure-ad,-google,-etc.)"
+ }
+ ],
+ "anchor": "step-1.-enable-oidc-in-the-api's-configuration-file"
+ },
+ {
+ "title": "Step 2. Configure Your OIDC Provider (Keycloak Example)",
+ "children": [
+ {
+ "title": "2.1. Easy setup using Pre-configured Realm Export:",
+ "children": [],
+ "anchor": "2.1.-easy-setup-using-pre-configured-realm-export:"
+ },
+ {
+ "title": "2.2. Using Custom configuration:",
+ "children": [],
+ "anchor": "2.2.-using-custom-configuration:"
+ },
+ {
+ "title": "2.3. If you have existing OIDC provider (Okta, Azure
AD, Google, etc.)",
+ "children": [],
+ "anchor":
"2.3.-if-you-have-existing-oidc-provider-(okta,-azure-ad,-google,-etc.)"
+ }
+ ],
+ "anchor": "step-2.-configure-your-oidc-provider-(keycloak-example)"
+ },
+ {
+ "title": "Step 3. Login with OIDC",
+ "children": [
+ {
+ "title": "2.1. Easy setup using Pre-configured Realm Export:",
+ "children": [],
+ "anchor": "2.1.-easy-setup-using-pre-configured-realm-export:"
+ },
+ {
+ "title": "2.2. Using Custom configuration:",
+ "children": [],
+ "anchor": "2.2.-using-custom-configuration:"
+ },
+ {
+ "title": "2.3. If you have existing OIDC provider (Okta, Azure
AD, Google, etc.)",
+ "children": [],
+ "anchor":
"2.3.-if-you-have-existing-oidc-provider-(okta,-azure-ad,-google,-etc.)"
+ }
+ ],
+ "anchor": "step-3.-login-with-oidc"
+ }
+ ],
+ "anchor": "oidc-(openid-connect)"
}
],
"title": "Authentication Type",
diff --git a/python/2.0.5/.buildinfo b/python/2.0.5/.buildinfo
index c721eddf7f..1759f76b06 100644
--- a/python/2.0.5/.buildinfo
+++ b/python/2.0.5/.buildinfo
@@ -1,4 +1,4 @@
# Sphinx build info version 1
# This file records the configuration used when building these files. When it
is not found, a full rebuild will be done.
-config: 6effbffeb934c5b0d33c615744d1bf5a
+config: 9ab37b1b7f419b97e08c7ea828c059a2
tags: 645f666f9bcd5a90fca523b33c5a78b7
diff --git a/python/2.0.6/.buildinfo b/python/2.0.6/.buildinfo
index 7d1bd73661..379373386a 100644
--- a/python/2.0.6/.buildinfo
+++ b/python/2.0.6/.buildinfo
@@ -1,4 +1,4 @@
# Sphinx build info version 1
# This file records the configuration used when building these files. When it
is not found, a full rebuild will be done.
-config: 6c763b0786eba85fc7645638fde572a5
+config: e0e0cc0bae3902b226afd734651f2a6a
tags: 645f666f9bcd5a90fca523b33c5a78b7
diff --git a/python/2.0.7/.buildinfo b/python/2.0.7/.buildinfo
index 4b076b82d4..8e9d2caae0 100644
--- a/python/2.0.7/.buildinfo
+++ b/python/2.0.7/.buildinfo
@@ -1,4 +1,4 @@
# Sphinx build info version 1
# This file records the configuration used when building these files. When it
is not found, a full rebuild will be done.
-config: b80171d71e3b7bb4b2e3063c9ff32da1
+config: 53ebfb40b865339fe558686fff1a8887
tags: 645f666f9bcd5a90fca523b33c5a78b7
diff --git a/python/3.0.0/.buildinfo b/python/3.0.0/.buildinfo
index 4fd962527b..839cd041eb 100644
--- a/python/3.0.0/.buildinfo
+++ b/python/3.0.0/.buildinfo
@@ -1,4 +1,4 @@
# Sphinx build info version 1
# This file records the configuration used when building these files. When it
is not found, a full rebuild will be done.
-config: 6fdf0e43c50b1aba9c35afd497b04fe7
+config: 7e574c318bff49560e6171ff18d85c5d
tags: 645f666f9bcd5a90fca523b33c5a78b7
diff --git a/python/3.0.1/.buildinfo b/python/3.0.1/.buildinfo
index 519e6c56fe..3aca0767ab 100644
--- a/python/3.0.1/.buildinfo
+++ b/python/3.0.1/.buildinfo
@@ -1,4 +1,4 @@
# Sphinx build info version 1
# This file records the configuration used when building these files. When it
is not found, a full rebuild will be done.
-config: 1249ce8068896b0b36984841fc973659
+config: 52cb30c8ab156e7bfbba77e13a40d938
tags: 645f666f9bcd5a90fca523b33c5a78b7
diff --git a/python/3.1.0/.buildinfo b/python/3.1.0/.buildinfo
index c0f868a6ec..9d2f72aa27 100644
--- a/python/3.1.0/.buildinfo
+++ b/python/3.1.0/.buildinfo
@@ -1,4 +1,4 @@
# Sphinx build info version 1
# This file records the configuration used when building these files. When it
is not found, a full rebuild will be done.
-config: 5af421d0f51702607d21c924f799e4d1
+config: 957a88d6820a4ca63badbbc6f849b2c7
tags: 645f666f9bcd5a90fca523b33c5a78b7
diff --git a/python/4.0.0/.buildinfo b/python/4.0.0/.buildinfo
index 528a50e5b1..19279b6f44 100644
--- a/python/4.0.0/.buildinfo
+++ b/python/4.0.0/.buildinfo
@@ -1,4 +1,4 @@
# Sphinx build info version 1
# This file records the configuration used when building these files. When it
is not found, a full rebuild will be done.
-config: a2eb0b6dd39fda8d8332ef022608bb1a
+config: b375bc5ea911887ad9450a1623039a8b
tags: 645f666f9bcd5a90fca523b33c5a78b7
diff --git a/python/4.0.1/.buildinfo b/python/4.0.1/.buildinfo
index b9a3ff228e..16b7052870 100644
--- a/python/4.0.1/.buildinfo
+++ b/python/4.0.1/.buildinfo
@@ -1,4 +1,4 @@
# Sphinx build info version 1
# This file records the configuration used when building these files. When it
is not found, a full rebuild will be done.
-config: 40c5f46c47b32f536a6d3533109d89e4
+config: f98ef86c7ca8314d388ac730affe30b8
tags: 645f666f9bcd5a90fca523b33c5a78b7
diff --git a/python/4.0.2/.buildinfo b/python/4.0.2/.buildinfo
index 55a57c10a1..0549c4b4a6 100644
--- a/python/4.0.2/.buildinfo
+++ b/python/4.0.2/.buildinfo
@@ -1,4 +1,4 @@
# Sphinx build info version 1
# This file records the configuration used when building these files. When it
is not found, a full rebuild will be done.
-config: f9f269432eb06d3c89850c20137ef44b
+config: 8a968477033d767ff91a9fefb9f36f20
tags: 645f666f9bcd5a90fca523b33c5a78b7
diff --git a/python/4.0.3/.buildinfo b/python/4.0.3/.buildinfo
index 939ecb4966..083ca00af4 100644
--- a/python/4.0.3/.buildinfo
+++ b/python/4.0.3/.buildinfo
@@ -1,4 +1,4 @@
# Sphinx build info version 1
# This file records the configuration used when building these files. When it
is not found, a full rebuild will be done.
-config: 7ef3dd0a1fcd16cede6e20a3313a8e2a
+config: e2d1bb94fd3cdef656ec73c946d1ee9c
tags: 645f666f9bcd5a90fca523b33c5a78b7
diff --git a/python/4.0.4/.buildinfo b/python/4.0.4/.buildinfo
index 62f9f74349..8d2da2c239 100644
--- a/python/4.0.4/.buildinfo
+++ b/python/4.0.4/.buildinfo
@@ -1,4 +1,4 @@
# Sphinx build info version 1
# This file records the configuration used when building these files. When it
is not found, a full rebuild will be done.
-config: 58fb5378b3a93c2d91a1c7265b4b74da
+config: 265b0a37b1b62952ef8a37dceaa2723f
tags: 645f666f9bcd5a90fca523b33c5a78b7
diff --git a/python/4.1.0/.buildinfo b/python/4.1.0/.buildinfo
index f52ee31942..7c6c9c0c86 100644
--- a/python/4.1.0/.buildinfo
+++ b/python/4.1.0/.buildinfo
@@ -1,4 +1,4 @@
# Sphinx build info version 1
# This file records the configuration used when building these files. When it
is not found, a full rebuild will be done.
-config: 01d4ff86372e2808c71a84657b7ae5e5
+config: 3c78e8aa01972b3f475c236398e578de
tags: 645f666f9bcd5a90fca523b33c5a78b7
diff --git a/python/main/.buildinfo b/python/main/.buildinfo
index 3db2c48b13..e13e5c1f3f 100644
--- a/python/main/.buildinfo
+++ b/python/main/.buildinfo
@@ -1,4 +1,4 @@
# Sphinx build info version 1
# This file records the configuration used when building these files. When it
is not found, a full rebuild will be done.
-config: fbede4401ea0dae496925ca406dd781e
+config: a2d1da368c9f0f5bf2533db2b004758c
tags: 645f666f9bcd5a90fca523b33c5a78b7