mirror of https://github.com/grafana/grafana
Docs: Setup refactor (#49739)
* builds out refactored setup topics * Automatically fix some relrefs with mv-manager Signed-off-by: Jack Baldry <jack.baldry@grafana.com> * Use refs for tutorials content which is outside of this repository Signed-off-by: Jack Baldry <jack.baldry@grafana.com> * Manually fix complicated relrefs Signed-off-by: Jack Baldry <jack.baldry@grafana.com> * consolidates team sync and db encryption topics * Fix relrefs Signed-off-by: Jack Baldry <jack.baldry@grafana.com> * updates setup index file * Convert TOML to YAML Signed-off-by: Jack Baldry <jack.baldry@grafana.com> * Add current alias for new alerting content Signed-off-by: Jack Baldry <jack.baldry@grafana.com> * Add current aliases to new setup-grafana and configure-security pages Signed-off-by: Jack Baldry <jack.baldry@grafana.com> * Update docs/sources/setup-grafana/configure-grafana/_index.md Co-authored-by: Torkel Ödegaard <torkel@grafana.com> * moves saml docs, updates order in TOC * Manually fix relrefs Signed-off-by: Jack Baldry <jack.baldry@grafana.com> * added usage insights topics, adjusted weights * corrected relrefs * Fix relrefs broken in rebase Signed-off-by: Jack Baldry <jack.baldry@grafana.com> Co-authored-by: Jack Baldry <jack.baldry@grafana.com> Co-authored-by: Torkel Ödegaard <torkel@grafana.com>pull/50121/head
parent
104c4a7630
commit
a568d421f8
@ -1,21 +0,0 @@ |
||||
--- |
||||
aliases: |
||||
- /docs/grafana/latest/administration/jaeger-instrumentation/ |
||||
description: Jaeger traces emitted and propagation by Grafana |
||||
keywords: |
||||
- grafana |
||||
- jaeger |
||||
- tracing |
||||
title: Jaeger instrumentation |
||||
weight: 900 |
||||
--- |
||||
|
||||
# Jaeger instrumentation |
||||
|
||||
Grafana supports [Jaeger tracing](https://www.jaegertracing.io/). |
||||
|
||||
Grafana can emit Jaeger traces for its HTTP API endpoints and propagate Jaeger trace information to data sources. |
||||
All HTTP endpoints are logged evenly (annotations, dashboard, tags, and so on). |
||||
When a trace ID is propagated, it is reported with operation 'HTTP /datasources/proxy/:id/\*'. |
||||
|
||||
Refer to [Configuration]({{< relref "configuration.md#tracing-jaeger" >}}) for information about enabling Jaeger tracing. |
@ -1,27 +0,0 @@ |
||||
--- |
||||
aliases: |
||||
- /docs/grafana/latest/auth/ |
||||
description: Authentication |
||||
title: Authentication |
||||
weight: 30 |
||||
--- |
||||
|
||||
# User Authentication Overview |
||||
|
||||
Grafana provides many ways to authenticate users. Some authentication integrations also enable syncing user permissions and org memberships. |
||||
|
||||
Here is a table showing all supported authentication providers and the features available for them. [Team sync]({{< relref "../enterprise/team-sync.md" >}}) and [active sync]({{< relref "../enterprise/enhanced_ldap.md#active-ldap-synchronization" >}}) are only available in Grafana Enterprise. |
||||
|
||||
See also, [Grafana Authentication]({{< relref "grafana.md" >}}). |
||||
|
||||
| Provider | Support | Role mapping | Team sync<br> _(Enterprise only)_ | Active sync<br> _(Enterprise only)_ | |
||||
| ------------------------------------------------------------------------ | :-----: | :----------: | :-------------------------------: | :---------------------------------: | |
||||
| [Auth Proxy]({{< relref "auth-proxy.md" >}}) | v2.1+ | - | v6.3+ | - | |
||||
| [Azure AD OAuth]({{< relref "azuread.md" >}}) | v6.7+ | v6.7+ | v6.7+ | - | |
||||
| [Generic OAuth]({{< relref "generic-oauth.md" >}}) | v4.0+ | v6.5+ | - | - | |
||||
| [GitHub OAuth]({{< relref "github.md" >}}) | v2.0+ | - | v6.3+ | - | |
||||
| [GitLab OAuth]({{< relref "gitlab.md" >}}) | v5.3+ | - | v6.4+ | - | |
||||
| [Google OAuth]({{< relref "google.md" >}}) | v2.0+ | - | - | - | |
||||
| [LDAP]({{< relref "ldap.md" >}}) | v2.1+ | v2.1+ | v5.3+ | v6.3+ | |
||||
| [Okta OAuth]({{< relref "okta.md" >}}) | v7.0+ | v7.0+ | v7.0+ | - | |
||||
| [SAML]({{< relref "../enterprise/configure-saml/" >}}) (Enterprise only) | v6.3+ | v7.0+ | v7.0+ | - | |
@ -1,20 +0,0 @@ |
||||
--- |
||||
aliases: |
||||
- /docs/grafana/latest/auth/enhanced_ldap/ |
||||
description: 'Grafana Enhanced LDAP Integration Guide ' |
||||
keywords: |
||||
- grafana |
||||
- configuration |
||||
- documentation |
||||
- ldap |
||||
- active directory |
||||
- enterprise |
||||
title: Enhanced LDAP Integration |
||||
weight: 400 |
||||
--- |
||||
|
||||
# Enhanced LDAP integration |
||||
|
||||
The enhanced LDAP integration adds additional functionality on top of the existing [LDAP integration]({{< relref "ldap.md" >}}). |
||||
|
||||
> Enhanced LDAP integration is only available in Grafana Enterprise. For more information, refer to [Enhanced LDAP integration]({{< relref "../enterprise/enhanced_ldap.md" >}}) in [Grafana Enterprise]({{< relref "../enterprise/" >}}). |
@ -1,18 +0,0 @@ |
||||
--- |
||||
aliases: |
||||
- /docs/grafana/latest/auth/saml/ |
||||
description: Grafana SAML Authentication |
||||
keywords: |
||||
- grafana |
||||
- saml |
||||
- documentation |
||||
- saml-auth |
||||
title: SAML Authentication |
||||
weight: 1100 |
||||
--- |
||||
|
||||
# SAML authentication |
||||
|
||||
The SAML authentication integration allows your Grafana users to log in by using an external SAML Identity Provider (IdP). To enable this, Grafana becomes a Service Provider (SP) in the authentication flow, interacting with the IdP to exchange user information. |
||||
|
||||
> SAML authentication integration is available in Grafana Cloud Pro and Advanced and in Grafana Enterprise. For more information, refer to [SAML authentication]({{< relref "../enterprise/configure-saml/" >}}) in [Grafana Enterprise]({{< relref "../enterprise/" >}}). |
@ -1,27 +0,0 @@ |
||||
--- |
||||
aliases: |
||||
- /docs/grafana/latest/auth/saml/ |
||||
- /docs/grafana/latest/auth/team-sync/ |
||||
description: Grafana Team Sync |
||||
keywords: |
||||
- grafana |
||||
- auth |
||||
- documentation |
||||
title: Team Sync |
||||
weight: 1200 |
||||
--- |
||||
|
||||
# Team sync |
||||
|
||||
With Team Sync, you can set up synchronization between your auth provider's teams and teams in Grafana. This enables LDAP or GitHub OAuth users which are members |
||||
of certain teams/groups to automatically be added/removed as members to certain teams in Grafana. Currently the synchronization will only happen every |
||||
time a user logs in, unless LDAP is used together with active background synchronization that was added in Grafana 6.3. |
||||
|
||||
{{< figure src="/static/img/docs/enterprise/team_members_ldap.png" class="docs-image--no-shadow docs-image--right" max-width= "600px" >}} |
||||
|
||||
Grafana keeps track of all synchronized users in teams and you can see which users have been synchronized in the team members list, see `LDAP` label in screenshot. |
||||
This mechanism allows Grafana to remove an existing synchronized user from a team when its LDAP group membership (for example) changes. This mechanism also enables you to manually add a user as member of a team and it will not be removed when the user signs in. This gives you flexibility to combine LDAP group memberships and Grafana team memberships. |
||||
|
||||
<div class="clearfix"></div> |
||||
|
||||
> Team Sync is available in both Grafana Enterprise and Grafana Cloud Advanced. For more information, refer to [Team sync]({{< relref "../enterprise/team-sync.md" >}}) in [Grafana Enterprise]({{< relref "../enterprise/" >}}). |
Some files were not shown because too many files have changed in this diff Show More
Loading…
Reference in new issue