-
-
Notifications
You must be signed in to change notification settings - Fork 210
Open
Labels
area/rbacRelated to Role Based Access Control featureRelated to Role Based Access Control featurestatus/triage/completedAutomatic triage completedAutomatic triage completedstatus/triage/manualManual triage in progressManual triage in progresstype/bugSomething isn't workingSomething isn't working
Description
Issue submitter TODO list
- I've looked up my issue in FAQ
- I've searched for an already existing issues here
- I've tried running
main-labeled docker image and the issue still persists there - I'm running a supported version of the application which is listed here
Describe the bug (actual behavior)
We are encountering an issue where Okta-based RBAC roles are not being recognized or applied as expected within the Kafka UI (Kafbat) OAuth2 configuration. Despite a valid OAuth2 setup and successful authentication via Okta, the assigned user groups are not mapping correctly to the configured RBAC roles in the application.
The configuration is managed through Terraform and YAML application configuration, as shown below
yamlApplicationConfig:
auth:
type: OAUTH2
oauth2:
client:
okta:
clientId: "${local.okta_client_id}"
clientSecret: "${local.okta_client_secret}"
scope:
- "openid"
- "profile"
- "email"
client-name: "Okta"
provider: "okta"
redirect-uri: "${local.okta_redirect_uri}"
authorization-grant-type: "authorization_code"
user-name-attribute: "sub"
issuer-uri: "${local.okta_issuer_uri}"
jwk-set-uri: "${local.okta_jwk_set_uri}"
custom-params:
type: "oauth"
roles-field: "Groups3"
server:
forward-headers-strategy: native
servlet:
session:
cookie:
secure: true
rbac:
roles:
- name: "kafbat-read-role"
clusters:
- "${local.dev_msk_cluster_name}"
- "${local.stg_msk_cluster_name}"
subjects:
- provider: oauth
type: role
value: aws_sso_devops
permissions:
- resource: clusterconfig
actions: [ "view" ]
- resource: topic
value: ".*"
actions:
- VIEW
- MESSAGES_READ
- ANALYSIS_VIEW
- resource: consumer
value: ".*"
actions: [ view ]
- resource: schema
value: ".*"
actions: [ view ]
- resource: connect
value: ".*"
actions: [ view ]
- resource: acl
actions: [ view ]
Observed Behavior
- Login via Okta succeeds (user is authenticated).
- However, RBAC mapping does not occur — users appear without assigned roles.
- The roles-field parameter (Groups3) might not be resolving correctly from Okta claims.
Expected behavior
After successful OAuth2 authentication, Okta user group mappings (e.g., aws_sso_devops) should align with the RBAC configuration, automatically granting corresponding permissions (view, messages_read, etc.).
Your installation details
- App version - 8b5494b
- Helm chart version - v1.3.0
Steps to reproduce
- Authenticate to the application using Okta OAuth2.
- Inspect application logs and user role mapping.
Screenshots
Okta configuration:
Logs
No response
Additional context
No response
Metadata
Metadata
Assignees
Labels
area/rbacRelated to Role Based Access Control featureRelated to Role Based Access Control featurestatus/triage/completedAutomatic triage completedAutomatic triage completedstatus/triage/manualManual triage in progressManual triage in progresstype/bugSomething isn't workingSomething isn't working