Bug 1308843 - [DOCS][platformmanagment_public_612]Better to remind user in documentation to grant third-party access to organization info when using GithubIdentityProvider
Summary: [DOCS][platformmanagment_public_612]Better to remind user in documentation to...
Keywords:
Status: CLOSED CURRENTRELEASE
Alias: None
Product: OKD
Classification: Red Hat
Component: Documentation
Version: 3.x
Hardware: Unspecified
OS: Unspecified
low
low
Target Milestone: ---
: ---
Assignee: Alex Dellapenta
QA Contact: Xingxing Xia
Vikram Goyal
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2016-02-16 09:28 UTC by Xingxing Xia
Modified: 2023-05-29 06:44 UTC (History)
2 users (show)

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Clone Of:
Environment:
Last Closed: 2021-08-04 22:05:11 UTC
Target Upstream Version:
Embargoed:


Attachments (Terms of Use)
Later login would fail If the "Grant access" button is omitted at first time of login (27.73 KB, image/png)
2016-02-16 09:59 UTC, Xingxing Xia
no flags Details

Comment 1 Xingxing Xia 2016-02-16 09:59:07 UTC
Created attachment 1127548 [details]
Later login would fail If the "Grant access" button is omitted at first time of login

Comment 2 Xingxing Xia 2016-02-16 09:59:31 UTC
The reason is found: step 5.1, the first time of login with the new github account, I just clicked "Authorize application" button, but omitted "Grant access" button. Thus later login with that account always fails as the attachment shows.
But the shown error message "An authentication error occurred" is too simple. Could the message be more instructive? Because it takes some time (a bit painful) to find the reason is "Grant access" button omitted. Customer may be disappointed if he/she omits the button too at the first time of login.

Comment 3 Jordan Liggitt 2016-02-16 13:47:13 UTC
Unfortunately, if an organization has not granted access, there is no way to detect that from the GitHub API (it just doesn't appear in the user's list of organizations). In the server logs, we do log the user's organization membership if they don't appear to be a member of the configured organization, which could be helpful in debugging.

I'd like to keep this open and convert it to a documentation bug, and we can call out the requirement specifically in the documentation.

Comment 4 Jordan Liggitt 2016-02-16 15:32:15 UTC
According to GitHub, OAuth applications owned by the organization should automatically have access to the org info. In your tests, were you using an OAuth application owned by the organization you were using? I would expect that to be common, which should lessen the impact of this.

I also added a note to the GitHub IDP documentation in https://github.com/openshift/openshift-docs/pull/1600

Comment 5 Xingxing Xia 2016-02-17 03:06:07 UTC
Good to convert to a documentation bug.
It is true applications owned by the organization have access to the org info. This would lessen the impact. While in my test, it was not that case.
Thank you.

Comment 6 Xingxing Xia 2016-02-17 06:08:25 UTC
Code works well. Can login successfully with github accounts of the organizations specified in master config. So, according to comment 3 and https://github.com/openshift/openshift-docs/pull/1600, convert this bug to a documentation bug.

Comment 7 Alex Dellapenta 2021-08-04 22:05:11 UTC
This was resolved via https://github.com/openshift/openshift-docs/pull/1600.


Note You need to log in before you can comment on or make changes to this bug.