Skip to main content
Glama
README.mdโ€ข4.5 kB
# ๐Ÿ” OAuth Provider Examples This directory contains ready-to-use Helm values files for different OAuth 2.0 providers. ## ๐Ÿ“‹ Available Configurations | Provider | File | Description | |----------|------|-------------| | **๐ŸŸฆ Azure AD** | `values-azure.yaml` | Microsoft Azure AD / Entra ID | | **๐ŸŸจ Google** | `values-google.yaml` | Google OAuth 2.0 | | **๐ŸŸฅ Keycloak** | `values-keycloak.yaml` | Open-source identity management | | **๐ŸŸง Okta** | `values-okta.yaml` | Enterprise identity platform | | **โšซ GitHub** | `values-github.yaml` | GitHub OAuth 2.0 and GitHub Apps | ## ๐Ÿš€ Quick Start ### 1. Choose Your Provider Copy the appropriate values file for your OAuth provider: ```bash # For Azure AD cp helm/examples/values-azure.yaml helm/values-production.yaml # For Google OAuth cp helm/examples/values-google.yaml helm/values-production.yaml # For Keycloak cp helm/examples/values-keycloak.yaml helm/values-production.yaml # For Okta cp helm/examples/values-okta.yaml helm/values-production.yaml # For GitHub OAuth cp helm/examples/values-github.yaml helm/values-production.yaml ``` ### 2. Customize Configuration Edit your copied values file and replace: - OAuth client credentials - Your Kubernetes domain - Schema Registry URLs - Kubernetes namespace labels ### 3. Deploy ```bash cd helm ./deploy-k8s-mcp.sh ``` ## ๐Ÿ”ง Configuration Details ### Common Settings All examples include: - โœ… **Multi-registry support** for dev/staging/production - โœ… **Ingress with TLS** using Let's Encrypt - โœ… **Autoscaling** (2-5 replicas) - โœ… **Security contexts** (non-root user) - โœ… **Network policies** for K8s security - โœ… **Resource limits** for production use ### Provider-Specific Notes #### **๐ŸŸฆ Azure AD** (`values-azure.yaml`) - Requires: Tenant ID, Client ID, Client Secret - Scopes: `openid,email,profile,User.Read` - Best for: Enterprise Microsoft environments #### **๐ŸŸจ Google OAuth** (`values-google.yaml`) - Requires: Google Client ID, Client Secret - Scopes: `openid,email,profile` - Best for: Google Workspace organizations #### **๐ŸŸฅ Keycloak** (`values-keycloak.yaml`) - Requires: Keycloak Server URL, Realm, Client ID, Client Secret - Scopes: `openid,email,profile` - Best for: Self-hosted enterprise identity management #### **โšซ GitHub** (`values-github.yaml`) - Requires: GitHub Client ID, Client Secret - Scopes: `read:user,user:email,read:org,repo` - Organization restriction: Optional `GITHUB_ORG` setting - Best for: GitHub-centric development teams and open source projects #### **๐ŸŸง Okta** (`values-okta.yaml`) - Requires: Okta domain, Client ID, Client Secret - Authorization Server: `default` (or custom) - Best for: Enterprise SaaS environments ## ๐Ÿ“š Documentation For detailed setup instructions, see: - **[OAuth Providers Guide](../../docs/oauth-providers-guide.md)** - Complete setup instructions - **[Kubernetes Deployment Guide](../../K8S-DEPLOYMENT-GUIDE.md)** - Full deployment guide ## ๐Ÿงช Testing After deployment, test your OAuth integration: ```bash # Check MCP server status kubectl get pods -n kafka-tools # Test OAuth endpoint curl -k https://your-mcp-server.com/health # Port-forward for local testing kubectl port-forward -n kafka-tools svc/kafka-schema-registry-mcp 8080:80 ``` ## ๐Ÿ”’ Security Notes - **Never commit secrets** to version control - **Use Kubernetes secrets** for sensitive data - **Rotate client secrets** regularly - **Review scope permissions** before deployment - **Enable network policies** in production ## ๐Ÿ†˜ Troubleshooting Common issues and solutions: ### Invalid OAuth Configuration ```bash # Check OAuth secret kubectl get secret -n kafka-tools oauth-secret -o yaml # Check pod logs kubectl logs -n kafka-tools deployment/kafka-schema-registry-mcp ``` ### Ingress/TLS Issues ```bash # Check certificate kubectl describe certificate -n kafka-tools mcp-schema-registry-tls # Check ingress kubectl describe ingress -n kafka-tools ``` ### Network Connectivity ```bash # Test Schema Registry access kubectl exec -n kafka-tools deployment/kafka-schema-registry-mcp -- \ curl -s http://schema-registry-dev.kafka.svc.cluster.local:8081/subjects ``` ## ๐Ÿ’ก Tips - **Start with development values** for testing - **Use environment-specific files** for CI/CD - **Test OAuth flow** before production deployment - **Monitor authentication logs** for security - **Document your customizations** for team reference Happy secure schema management! ๐Ÿ”๐Ÿš€

Latest Blog Posts

MCP directory API

We provide all the information about MCP servers via our MCP API.

curl -X GET 'https://glama.ai/api/mcp/v1/servers/aywengo/kafka-schema-reg-mcp'

If you have feedback or need assistance with the MCP directory API, please join our Discord server