<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>question Re: How to configure Superset to use LDAP? in Support Questions</title>
    <link>https://community.cloudera.com/t5/Support-Questions/How-to-configure-Superset-to-use-LDAP/m-p/243810#M205608</link>
    <description>&lt;P&gt;&lt;A rel="user" href="https://community.cloudera.com/users/114262/zoujingyong52.html"&gt;@jingyong zou&lt;/A&gt; you should not use AUTH_LDAP_APPEND_DOMAIN unless your users are authenticating using the fully qualified principal name as in "username@mydomain.com" instead of simply "username". If you use uid or samAccountName as AUTH_LDAP_UID_FIELD (as is the case with OpenLDAP, IPA or AD) then this is not needed,&lt;/P&gt;&lt;P&gt;Also check the values for the parameters AUTH_USER_REGISTRATION=True and AUTH_USER_REGISTRATION_ROLE which should be set to a valid role in Superset (Public, Gamma, Alpha o Admin).&lt;/P&gt;&lt;P&gt;Another not very documented parameter which may be important depending on your LDAP setup is AUTH_LDAP_USERNAME_FORMAT, check this also.&lt;/P&gt;&lt;P&gt;With the previous advises in mind, check carefully the following documentation articles and you may be able to find your appropiate options combination to make LDAP work with Superset:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;A href="https://flask-appbuilder.readthedocs.io/en/latest/config.html"&gt;https://flask-appbuilder.readthedocs.io/en/latest/config.html&lt;/A&gt;&lt;/LI&gt;&lt;LI&gt;&lt;A href="https://superset.incubator.apache.org/security.html"&gt;https://superset.incubator.apache.org/security.html&lt;/A&gt;&lt;/LI&gt;&lt;LI&gt;&lt;A href="https://flask-appbuilder.readthedocs.io/en/latest/security.html#authentication-ldap"&gt;https://flask-appbuilder.readthedocs.io/en/latest/security.html#authentication-ldap&lt;/A&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;A tcpdump capture in your Superset server + wireshark analysis may be also of much help to debug what is your current Superset config sending to the LDAP server. In my case this was the "final step" to fit all the pieces.&lt;/P&gt;</description>
    <pubDate>Fri, 24 May 2019 21:55:51 GMT</pubDate>
    <dc:creator>lvazquez</dc:creator>
    <dc:date>2019-05-24T21:55:51Z</dc:date>
    <item>
      <title>How to configure Superset to use LDAP?</title>
      <link>https://community.cloudera.com/t5/Support-Questions/How-to-configure-Superset-to-use-LDAP/m-p/243807#M205605</link>
      <description>&lt;P&gt;We need to configure Superset, running within HDP 3.1, to use existing LDAP. &lt;/P&gt;&lt;P&gt;We could not find any proper documentation on how to do this. Are there any defined steps?&lt;/P&gt;&lt;P&gt;Thanks in advance.&lt;/P&gt;</description>
      <pubDate>Fri, 16 Sep 2022 15:51:55 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/How-to-configure-Superset-to-use-LDAP/m-p/243807#M205605</guid>
      <dc:creator>fernando_lopez</dc:creator>
      <dc:date>2022-09-16T15:51:55Z</dc:date>
    </item>
    <item>
      <title>Re: How to configure Superset to use LDAP?</title>
      <link>https://community.cloudera.com/t5/Support-Questions/How-to-configure-Superset-to-use-LDAP/m-p/243808#M205606</link>
      <description>&lt;P&gt;I also need it.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&lt;/P&gt;&lt;PRE&gt;AUTH_TYPE = AUTH_LDAP 
AUTH_USER_REGISTRATION = True 
AUTH_LDAP_SERVER = "ldap://XXX"
AUTH_LDAP_SEARCH="dc=XXX,dc=com"
AUTH_LDAP_APPEND_DOMAIN = "XXX.com"
AUTH_LDAP_UID_FIELD="userPrincipalName"
AUTH_LDAP_FIRSTNAME_FIELD="givenName"
AUTH_LDAP_LASTTNAME_FIELD="sn"
AUTH_LDAP_USE_TLS = False&lt;/PRE&gt;</description>
      <pubDate>Thu, 23 May 2019 20:16:26 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/How-to-configure-Superset-to-use-LDAP/m-p/243808#M205606</guid>
      <dc:creator>zoujingyong52</dc:creator>
      <dc:date>2019-05-23T20:16:26Z</dc:date>
    </item>
    <item>
      <title>Re: How to configure Superset to use LDAP?</title>
      <link>https://community.cloudera.com/t5/Support-Questions/How-to-configure-Superset-to-use-LDAP/m-p/243809#M205607</link>
      <description>&lt;P&gt;The above question and the reply thread below was originally posted in the &lt;A href="https://community.hortonworks.com/spaces/101/index.html"&gt;Community Help Track&lt;/A&gt;. On Fri May 24 03:20 UTC 2019, a member of the HCC moderation staff moved it to the &lt;A href="https://community.hortonworks.com/spaces/62/index.html"&gt;Security&lt;/A&gt; track. The &lt;EM&gt;Community Help Track&lt;/EM&gt; is intended for questions about using the HCC site itself.&lt;/P&gt;</description>
      <pubDate>Fri, 24 May 2019 10:34:40 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/How-to-configure-Superset-to-use-LDAP/m-p/243809#M205607</guid>
      <dc:creator>ask_bill_brooks</dc:creator>
      <dc:date>2019-05-24T10:34:40Z</dc:date>
    </item>
    <item>
      <title>Re: How to configure Superset to use LDAP?</title>
      <link>https://community.cloudera.com/t5/Support-Questions/How-to-configure-Superset-to-use-LDAP/m-p/243810#M205608</link>
      <description>&lt;P&gt;&lt;A rel="user" href="https://community.cloudera.com/users/114262/zoujingyong52.html"&gt;@jingyong zou&lt;/A&gt; you should not use AUTH_LDAP_APPEND_DOMAIN unless your users are authenticating using the fully qualified principal name as in "username@mydomain.com" instead of simply "username". If you use uid or samAccountName as AUTH_LDAP_UID_FIELD (as is the case with OpenLDAP, IPA or AD) then this is not needed,&lt;/P&gt;&lt;P&gt;Also check the values for the parameters AUTH_USER_REGISTRATION=True and AUTH_USER_REGISTRATION_ROLE which should be set to a valid role in Superset (Public, Gamma, Alpha o Admin).&lt;/P&gt;&lt;P&gt;Another not very documented parameter which may be important depending on your LDAP setup is AUTH_LDAP_USERNAME_FORMAT, check this also.&lt;/P&gt;&lt;P&gt;With the previous advises in mind, check carefully the following documentation articles and you may be able to find your appropiate options combination to make LDAP work with Superset:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;A href="https://flask-appbuilder.readthedocs.io/en/latest/config.html"&gt;https://flask-appbuilder.readthedocs.io/en/latest/config.html&lt;/A&gt;&lt;/LI&gt;&lt;LI&gt;&lt;A href="https://superset.incubator.apache.org/security.html"&gt;https://superset.incubator.apache.org/security.html&lt;/A&gt;&lt;/LI&gt;&lt;LI&gt;&lt;A href="https://flask-appbuilder.readthedocs.io/en/latest/security.html#authentication-ldap"&gt;https://flask-appbuilder.readthedocs.io/en/latest/security.html#authentication-ldap&lt;/A&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;A tcpdump capture in your Superset server + wireshark analysis may be also of much help to debug what is your current Superset config sending to the LDAP server. In my case this was the "final step" to fit all the pieces.&lt;/P&gt;</description>
      <pubDate>Fri, 24 May 2019 21:55:51 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/How-to-configure-Superset-to-use-LDAP/m-p/243810#M205608</guid>
      <dc:creator>lvazquez</dc:creator>
      <dc:date>2019-05-24T21:55:51Z</dc:date>
    </item>
    <item>
      <title>Re: How to configure Superset to use LDAP?</title>
      <link>https://community.cloudera.com/t5/Support-Questions/How-to-configure-Superset-to-use-LDAP/m-p/243811#M205609</link>
      <description>&lt;P&gt;HDP3.1 + Superset 0.23.0 ,I don't know how to configure it&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="108975-1559022484776.png" style="width: 1338px;"&gt;&lt;img src="https://community.cloudera.com/t5/image/serverpage/image-id/13428iB462248058C6AFF9/image-size/medium?v=v2&amp;amp;px=400" role="button" title="108975-1559022484776.png" alt="108975-1559022484776.png" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Sat, 17 Aug 2019 21:40:00 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/How-to-configure-Superset-to-use-LDAP/m-p/243811#M205609</guid>
      <dc:creator>zoujingyong52</dc:creator>
      <dc:date>2019-08-17T21:40:00Z</dc:date>
    </item>
    <item>
      <title>Re: How to configure Superset to use LDAP?</title>
      <link>https://community.cloudera.com/t5/Support-Questions/How-to-configure-Superset-to-use-LDAP/m-p/243812#M205610</link>
      <description>&lt;P&gt;Have you made any progress on this? &lt;/P&gt;</description>
      <pubDate>Tue, 28 May 2019 12:49:55 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/How-to-configure-Superset-to-use-LDAP/m-p/243812#M205610</guid>
      <dc:creator>zoujingyong52</dc:creator>
      <dc:date>2019-05-28T12:49:55Z</dc:date>
    </item>
    <item>
      <title>Re: How to configure Superset to use LDAP?</title>
      <link>https://community.cloudera.com/t5/Support-Questions/How-to-configure-Superset-to-use-LDAP/m-p/283037#M210367</link>
      <description>&lt;P&gt;Ditto on the need.&amp;nbsp; I filled in all the fields in Ambari (in a Kerberized cluster) and no luck.&amp;nbsp; Is there supposed to be any logging somewhere other than /var/log/superset/superset.log to show either issues or attempts to login?&lt;/P&gt;</description>
      <pubDate>Thu, 14 Nov 2019 22:34:05 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/How-to-configure-Superset-to-use-LDAP/m-p/283037#M210367</guid>
      <dc:creator>jeff_watson</dc:creator>
      <dc:date>2019-11-14T22:34:05Z</dc:date>
    </item>
    <item>
      <title>Re: How to configure Superset to use LDAP?</title>
      <link>https://community.cloudera.com/t5/Support-Questions/How-to-configure-Superset-to-use-LDAP/m-p/283060#M210384</link>
      <description>&lt;P&gt;&lt;a href="https://community.cloudera.com/t5/user/viewprofilepage/user-id/48641"&gt;@jeff_watson&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;To enable debug on superset logs, follow below steps&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;&lt;P&gt;Stop Superset from Ambari&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;Add this line at the end of /usr/hdp/current/superset/lib/python3.4/site-packages/superset/__&lt;STRONG&gt;init&lt;/STRONG&gt;.py&lt;/P&gt;&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;logging.getLogger('flask_appbuilder').setLevel(logging.DEBUG)&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;3. Then Start superset manually using following command&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;source /usr/hdp/current/superset/conf/superset-env.sh ; /usr/hdp/current/superset/bin/python3.4 /usr/hdp/current/superset/bin/gunicorn --log-level debug -b `hostname`:9088 superset:app&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 15 Nov 2019 05:56:27 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/How-to-configure-Superset-to-use-LDAP/m-p/283060#M210384</guid>
      <dc:creator>Scharan</dc:creator>
      <dc:date>2019-11-15T05:56:27Z</dc:date>
    </item>
    <item>
      <title>Re: How to configure Superset to use LDAP?</title>
      <link>https://community.cloudera.com/t5/Support-Questions/How-to-configure-Superset-to-use-LDAP/m-p/290616#M214986</link>
      <description>&lt;P&gt;Turning on debug mode showed a little bit of additional information and eventually got me to look at the code and added a few debug lines of my own to /usr/hdp/current/superset/lib/python3.6/site-packages/flask_appbuilder/security/manager.py in _search_ldap to show the filter_str and username being passed to the LDAP search. I saw the filter_str was set to userPrinicipalName=jeff.watson@our.domain, so I got rid of the&amp;nbsp;@our.domain adding&amp;nbsp;&lt;SPAN&gt;AUTH_LDAP_APPEND_DOMAIN, but that still didn't work.&amp;nbsp; I finally remembered that Ranger used sSAMAcountName as an AD search name,so&lt;/SPAN&gt;&amp;nbsp;I changed add&amp;nbsp;&lt;SPAN&gt;AUTH_&lt;/SPAN&gt;&lt;SPAN&gt;LDAP_&lt;/SPAN&gt;&lt;SPAN&gt;UID_&lt;/SPAN&gt;&lt;SPAN&gt;FIELD as&amp;nbsp;sAMAccountName and poof, LDAP logins work.&amp;nbsp; Note:&amp;nbsp; Ambari settings aren't saved where the command line version can find them until I saved and restarted superset in Ambari, then stopped it again so I could run it interactively to see the debug logging.&amp;nbsp; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;I'm busy and lazy, so I didn't start removing other settings to see what I needed or didn't need, so here are the settings that worked for me.&amp;nbsp; Our cluster is Kerberized and uses self signed certificates.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;AUTH_LDAP_UID_FIELD=sAMAccountName&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;AUTH_LDAP_BIND_USER=CN=Bind,OU=Admin,dc=our,dc=domain&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;AUTH_LDAP_SEARCH=OU=Employees,dc=our,dc=domain&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;AUTH_LDAP_SERVER=ldap://our.domain&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;AUTH_LDAP=AUTH_LDAP&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;AUTH_LDAP_ALLOW_SELF_SIGNED=True&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;AUTH_LDAP_APPEND_DOMAIN=False&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;AUTH_LDAP_FIRSTNAME_FIELD=givenName&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;AUTH_LDAP_LASTNAME_FIELD=sn&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;AUTH_LDAP_USE_TLS=False&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;AUTH_USER_REGISTRATION=True&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;ENABLE_KERBEROS_AUTHENTICATION=True&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&lt;SPAN class="ember-view"&gt;KERBEROS_KEYTAB=/etc/security/keytabs/superset.headless.keytab&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&lt;SPAN class="ember-view"&gt;KERBEROS_PRINCIPAL=superset-sdrdev@OUR.DOMAIN&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 27 Feb 2020 15:45:45 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/How-to-configure-Superset-to-use-LDAP/m-p/290616#M214986</guid>
      <dc:creator>jeff_watson</dc:creator>
      <dc:date>2020-02-27T15:45:45Z</dc:date>
    </item>
    <item>
      <title>Re: How to configure Superset to use LDAP?</title>
      <link>https://community.cloudera.com/t5/Support-Questions/How-to-configure-Superset-to-use-LDAP/m-p/357754#M237660</link>
      <description>&lt;P&gt;How would you check logs related to ldap , In mine all docker-container like superset_app , superset-worker showing no error, but i can't be able to log from normal user either or ldap one&lt;BR /&gt;My configured things&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;from flask_appbuilder.security.manager import AUTH_LDAP

AUTH_TYPE = AUTH_LDAP 
AUTH_USER_REGISTRATION = True 
AUTH_LDAP_SERVER = "ldap://localhost:389"
# AUTH_LDAP_SEARCH="ou=people,dc=superset,dc=com"
AUTH_LDAP_SEARCH= "cn=admin,dc=ramhlocal,dc=com"
# AUTH_LDAP_APPEND_DOMAIN = "XXX.com"
AUTH_LDAP_UID_FIELD="cn"
AUTH_LDAP_FIRSTNAME_FIELD= "Rohit"
AUTH_LDAP_LASTTNAME_FIELD= "sn"
AUTH_LDAP_USE_TLS = False

# AUTH_LDAP_UID_FIELD=sAMAccountName
# AUTH_LDAP_BIND_USER=CN=Bind,OU=Admin,dc=our,dc=domain

AUTH_LDAP_ALLOW_SELF_SIGNED= True
AUTH_LDAP_APPEND_DOMAIN= False&lt;/LI-CODE&gt;</description>
      <pubDate>Wed, 16 Nov 2022 09:24:42 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/How-to-configure-Superset-to-use-LDAP/m-p/357754#M237660</guid>
      <dc:creator>rohipawa</dc:creator>
      <dc:date>2022-11-16T09:24:42Z</dc:date>
    </item>
  </channel>
</rss>

