Skip to content
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
Show all changes
33 commits
Select commit Hold shift + click to select a range
d7dd454
docs: refactor enterprise installation docs
gavinelder Dec 22, 2025
06cc186
docs: refactor enterprise installation docs
gavinelder Dec 22, 2025
2b0ede1
docs: refactor enterprise installation docs
gavinelder Dec 22, 2025
2430435
Merge branch 'master' into ge/enterprise-docs-personal
justinegeffen Jan 21, 2026
f6bbdcb
Merge branch 'master' into ge/enterprise-docs-personal
justinegeffen Jan 25, 2026
8dbc4aa
Apply suggestion from @justinegeffen
justinegeffen Jan 26, 2026
4e6694e
Apply suggestion from @justinegeffen
justinegeffen Jan 26, 2026
cbd9f1b
Apply suggestion from @justinegeffen
justinegeffen Jan 26, 2026
7dae663
Merge branch 'master' into ge/enterprise-docs-personal
justinegeffen Jan 26, 2026
387b4a2
Refactor devops-persona.md for clarity and consistency
justinegeffen Jan 26, 2026
43b66dc
Ported changes to 25.3
justinegeffen Jan 26, 2026
b0169d3
porting to 25.2 and 25.1
justinegeffen Jan 26, 2026
46bc4db
Update platform-enterprise_docs/enterprise-sidebar.json
justinegeffen Jan 26, 2026
6ff8a2a
Update platform-enterprise_docs/enterprise/configuration/mirroring.md
justinegeffen Jan 26, 2026
5c6d6b4
Update platform-enterprise_docs/enterprise/configuration/wave.md
justinegeffen Jan 26, 2026
ea9046f
Update platform-enterprise_docs/enterprise/kubernetes.md
justinegeffen Jan 26, 2026
41e11c6
Fix YAML document missing separator (#1058)
bebosudo Jan 26, 2026
e8be000
chore: Improve pre-commit formatter (#1059)
bebosudo Jan 26, 2026
5304cb5
Changelog: Wave v1.32.2 (#1061)
github-actions[bot] Jan 26, 2026
5853310
Update Studio features and compute environment fixes (#1063)
justinegeffen Jan 27, 2026
45447cb
Update v25.x sidebars
bebosudo Jan 27, 2026
28e3ef3
Update v25.x mirroring docs
bebosudo Jan 27, 2026
14619cc
Update v25.x wave docs
bebosudo Jan 27, 2026
1efcd77
Update v25.x docker compose docs with redis instructions
bebosudo Jan 27, 2026
6846c91
Grammar
bebosudo Jan 27, 2026
b3f6050
Merge branch 'master' into ge/enterprise-docs-personal
bebosudo Jan 27, 2026
bb02aa8
Fix v25.x json sidebars
bebosudo Jan 27, 2026
d1a1c8a
docs: refactor authentication
gavinelder Dec 22, 2025
97a158a
docs: refactor authentication
gavinelder Dec 22, 2025
5c2e54f
Apply suggestions from code review
gavinelder Jan 27, 2026
a3e8df6
Merge branch 'master' into ge/feat-authentication
bebosudo Jan 27, 2026
06e30c5
Revert changes to v25.1 and .2 due to botched merge
bebosudo Jan 27, 2026
a739c87
Backport auth entries to v25.3, v25.2 and v25.1
bebosudo Jan 27, 2026
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
16 changes: 16 additions & 0 deletions platform-enterprise_docs/enterprise-sidebar.json
Original file line number Diff line number Diff line change
Expand Up @@ -58,6 +58,22 @@
"collapsed": true,
"items": [
"enterprise/configuration/overview",
{
"type": "category",
"label": "Authentication",
"collapsed": true,
"link": {
"type": "doc",
"id": "enterprise/configuration/authentication/overview"
},
"items": [
"enterprise/configuration/authentication/github",
"enterprise/configuration/authentication/google",
"enterprise/configuration/authentication/keycloak",
"enterprise/configuration/authentication/entra",
"enterprise/configuration/authentication/okta"
]
},
"enterprise/configuration/networking",
"enterprise/configuration/ssl_tls",
"enterprise/configuration/reverse_proxy",
Expand Down
193 changes: 0 additions & 193 deletions platform-enterprise_docs/enterprise/configuration/authentication.md

This file was deleted.

Original file line number Diff line number Diff line change
@@ -0,0 +1,65 @@
---
title: "Entra ID"
description: Configure Microsoft Entra ID as an identity provider for Seqera Platform
date: "2026-01-27"
tags: [authentication, entra, azure, oidc]
---

Configure [Microsoft Entra ID](https://learn.microsoft.com/en-us/entra/identity-platform/v2-protocols-oidc) as a single sign-on (SSO) provider for Seqera Platform using OpenID Connect.

## Prerequisites

Before you begin, you need:

- An Azure account with Entra ID access
- Permission to create app registrations

Ensure you know how to register applications in Entra ID. See Microsoft's documentation on [registering an application](https://learn.microsoft.com/en-us/entra/identity-platform/quickstart-register-app) for more information.

## Register an Entra ID application

1. In the [Azure portal](https://portal.azure.com/), go to **Entra ID > App Registrations**.
2. Select **New Registration** and specify a name and supported account types.
3. Set the redirect URI to `https://<HOST>/oauth/callback/oidc` (must be HTTPS) - replace `<HOST>` with your enterprise installation hostname.
4. Note the **Application (client) ID** from the app overview.
5. Go to **Certificates & secrets** and create a new client secret. Note the secret value.
6. Go to **Endpoints** and note the OpenID Connect metadata document URI (up to `v2.0`).

## Configure Seqera

Add the following environment variables to your Seqera configuration:

| Variable | Description |
| :------- | :---------- |
| `TOWER_OIDC_CLIENT` | The application (client) ID from step 4 |
| `TOWER_OIDC_SECRET` | The client secret from step 5 |
| `TOWER_OIDC_ISSUER` | The issuer URL from step 6, e.g., `https://login.microsoftonline.com/<tenant-id>/v2.0` |

Add `auth-oidc` to the `MICRONAUT_ENVIRONMENTS` environment variable for both the `cron` and `backend` services.

### User consent settings

Configure user consent settings to **Allow user consent for apps** to ensure admin approval is not required for each login. See [User consent settings](https://learn.microsoft.com/en-us/azure/active-directory/manage-apps/configure-user-consent?pivots=portal#configure-user-consent-settings).

### Compatibility note

Users on Seqera Platform version 25.2.3 and below may need to set the following environment variable to resolve an authentication method incompatibility:

```env
MICRONAUT_SECURITY_OAUTH2_CLIENTS_OIDC_OPENID_TOKEN_AUTH_METHOD=client_secret_post
```

## Restrict access

To restrict access to specific email addresses or domains, configure an allow list in `tower.yml`:

```yaml
tower:
auth:
oidc:
allow-list:
- "*@your-company.example.com"
- "specific-user@another-company.example.net"
```

See [User access allow list](./overview#user-access-allow-list) for more information.
Original file line number Diff line number Diff line change
@@ -0,0 +1,49 @@
---
title: "GitHub"
description: Configure GitHub as an identity provider for Seqera Platform
date: "2026-01-27"
tags: [authentication, github, oauth]
---

Configure GitHub as a single sign-on (SSO) provider for Seqera Platform.

## Prerequisites

Before you begin, you need:

- A GitHub organization
- Permission to create OAuth Apps in your organization

Ensure you know how to create a GitHub OAuth app. See GitHub's documentation on [creating an OAuth app](https://docs.github.com/en/apps/oauth-apps/building-oauth-apps/creating-an-oauth-app) for more information.

## Create a GitHub OAuth App

1. In **Profile > Settings > Developer settings**, select **OAuth Apps**.
2. Select **New OAuth App**.
3. Complete the required fields. In the **Authorization callback URL** field, enter `https://<HOST>/oauth/callback/github` (must be HTTPS) - replace `<HOST>` with your enterprise installation hostname.
4. Note your **Client ID**.
5. Generate a client secret, then note your **Client secret**.

## Configure Seqera

Add the following environment variables to your Seqera configuration:

| Variable | Description |
| :------- | :---------- |
| `TOWER_GITHUB_CLIENT` | The client ID from step 4 |
| `TOWER_GITHUB_SECRET` | The client secret from step 5 |

## Restrict access

To restrict access to specific email addresses or domains, configure an allow list in `tower.yml`:

```yaml
tower:
auth:
github:
allow-list:
- "*@your-company.example.com"
- "specific-user@another-company.example.net"
```

See [User access allow list](./overview#user-access-allow-list) for more information.
Original file line number Diff line number Diff line change
@@ -0,0 +1,50 @@
---
title: "Google"
description: Configure Google as an identity provider for Seqera Platform
date: "2026-01-27"
tags: [authentication, google, oauth]
---

Configure Google as a single sign-on (SSO) provider for Seqera Platform.

## Prerequisites

Before you begin, you need:

- A Google Cloud account
- Permission to create OAuth credentials in the Google Cloud console

Ensure you know how to create Google OAuth credentials. See Google's documentation on [setting up OAuth 2.0](https://support.google.com/cloud/answer/6158849) for more information.

## Create Google OAuth credentials

1. In the [Google Cloud console](https://console.developers.google.com), create a new project or select an existing one.
2. Go to **APIs & Services > Credentials**.
3. Select **Create credentials > OAuth client ID**.
4. Select **Web Application** as the application type.
5. Add your redirect URI: `https://<HOST>/oauth/callback/google` (must be HTTPS) - replace `<HOST>` with your enterprise installation hostname.
6. Note your **Client ID** and **Client secret**.

## Configure Seqera

Add the following environment variables to your Seqera configuration:

| Variable | Description |
| :------- | :---------- |
| `TOWER_GOOGLE_CLIENT` | The client ID from step 6 |
| `TOWER_GOOGLE_SECRET` | The client secret from step 6 |

## Restrict access

To restrict access to specific email addresses or domains, configure an allow list in `tower.yml`:

```yaml
tower:
auth:
google:
allow-list:
- "*@your-company.example.com"
- "specific-user@another-company.example.net"
```

See [User access allow list](./overview#user-access-allow-list) for more information.
Loading