Authenticating with GitHub Sign-In

Step-by-step instructions for implementing GitHub Sign-In authentication in LogScale through OAuth App configuration. The process includes creating an OAuth App in GitHub settings, setting up the authorization callback URL, and configuring LogScale with the appropriate authentication parameters including client ID, client secret, and optional HTTP proxy settings.

See Creating an OAuth App for setup instructions.

  1. Create an OAuth App from your organization/user settings page,

  2. Set the Authorization callback URL: %PUBLIC_URL%/auth/github

  3. Once your app is created you can configure LogScale to authenticate with GitHub, like this:

    ini
    AUTHENTICATION_METHOD=oauth
    PUBLIC_URL=$YOUR_SERVERS_BASE_URL
    GITHUB_OAUTH_CLIENT_ID=$CLIENT_ID # The client_id from your GitHub OAuth App
    GITHUB_OAUTH_CLIENT_SECRET=$CLIENT_SECRET # The client_secret your GitHub OAuth App
    AUTO_CREATE_USER_ON_SUCCESSFUL_LOGIN=true  # default is false

    To have calls to the token endpoint for GitHub use the cluster's HTTP proxy settings, add the GITHUB_OAUTH_USE_HTTP_PROXY configuration and set the value to true.

    Read more about Configuration Variables.