Skip to content

Commit 19bb7fc

Browse files
authored
Merge pull request #907 from run-ai/doc-fixes-generic
fixes
2 parents 37d76e5 + ec6f130 commit 19bb7fc

31 files changed

+73
-73
lines changed

docs/Researcher/cli-reference/runai-submit-dist-mpi.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -341,7 +341,7 @@ You can start an unattended mpi training Job of name dist1, based on Project *te
341341
#### --node-pools `<string>`
342342

343343
> Instructs the scheduler to run this workload using specific set of nodes which are part of a [Node Pool](../../Researcher/scheduling/the-runai-scheduler.md#). You can specify one or more node pools to form a prioritized list of node pools that the scheduler will use to find one node pool that can provide the workload's specification. To use this feature your Administrator will need to label nodes as explained here: [Limit a Workload to a Specific Node Group](../../admin/researcher-setup/limit-to-node-group.md) or use existing node labels, then create a node-pool and assign the label to the node-pool.
344-
> This flag can be used in conjunction with node-type and Project-based affinity. In this case, the flag is used to refine the list of allowable node groups set from a node-pool. For more information see: [Working with Projects](../../admin/admin-ui-setup/).
344+
> This flag can be used in conjunction with node-type and Project-based affinity. In this case, the flag is used to refine the list of allowable node groups set from a node-pool. For more information see: [Working with Projects](../../admin/aiinitiatives/org/projects.md).
345345
346346
#### --node-type `<string>`
347347

docs/admin/admin-ui-setup/admin-ui-users.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ date: 2023-Dec-28
1111
The Run:ai UI allows you to manage all of the users in the Run:ai platform. There are two types of users, **local** users and **SSO** users. Local users are users that are created and managed in the Run:ai platform and SSO users are authorized to use the Run:ai platform using an identity provider. All users are assigned levels of access to all aspects of the UI including submitting jobs on the cluster.
1212

1313
!!! Tip
14-
It is possible to connect the Run:ai UI to the organization's directory and use single sign-on (SSO). This allows you to set Run:ai roles for users and groups from the organizational directory. For further information see [single sign-on configuration](../runai-setup/authentication/sso.md).
14+
It is possible to connect the Run:ai UI to the organization's directory and use single sign-on (SSO). This allows you to set Run:ai roles for users and groups from the organizational directory. For further information see [single sign-on configuration](../runai-setup/authentication/authentication-overview.md).
1515

1616
## Create a User
1717

docs/admin/runai-setup/authentication/researcher-authentication.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -24,7 +24,7 @@ Assign Researchers to Projects:
2424

2525
* Open the Run:ai user interface and navigate to `Users`. Add a Researcher and assign it a `Researcher` role.
2626
* Navigate to `Projects`. Edit or create a Project. Use the `Access Control` tab to assign the Researcher to the Project.
27-
* If you are using Single Sign-On, you can also assign _Groups_. For more information see the [Single Sign-On](sso.md) documentation.
27+
* If you are using Single Sign-On, you can also assign _Groups_. For more information see the [Single Sign-On](authentication-overview.md) documentation.
2828

2929
## Kubernetes Configuration
3030

docs/admin/runai-setup/authentication/sso/openidconnect.md

Lines changed: 26 additions & 26 deletions
Original file line numberDiff line numberDiff line change
@@ -18,13 +18,13 @@ Follow the steps below to setup SSO with OpenID Connect.
1818
### Adding the identity provider
1919

2020
1. Go to **Tools & Settings****General**
21-
1. Open the Security section and click **+IDENTITY PROVIDER**
22-
1. Select **Custom OpenID Connect**
23-
1. Enter the **Discovery URL**, **Client ID**, and **Client Secret**
24-
1. Copy the Redirect URL to be used in your identity provider
25-
1. Optional: Add the OIDC scopes
26-
1. Optional: Enter the user attributes and their value in the identity provider (see the user attributes table below)
27-
1. Click **SAVE**
21+
2. Open the Security section and click **+IDENTITY PROVIDER**
22+
3. Select **Custom OpenID Connect**
23+
4. Enter the **Discovery URL**, **Client ID**, and **Client Secret**
24+
5. Copy the Redirect URL to be used in your identity provider
25+
6. Optional: Add the OIDC scopes
26+
7. Optional: Enter the user attributes and their value in the identity provider (see the user attributes table below)
27+
8. Click **SAVE**
2828
User attributes
2929

3030
| Attribute | Default value in Run:ai | Description |
@@ -40,30 +40,30 @@ Follow the steps below to setup SSO with OpenID Connect.
4040
### Testing the setup
4141

4242
1. Log-in to the Run:ai platform as an admin
43-
1. Add [Access Rules](../accessrules.md) to an SSO user defined in the IDP
44-
1. Open the Run:ai platform in an incognito browser tab
45-
1. On the sign-in page click **CONTINUE WITH SSO**
43+
2. Add [Access Rules](../accessrules.md) to an SSO user defined in the IDP
44+
3. Open the Run:ai platform in an incognito browser tab
45+
4. On the sign-in page click **CONTINUE WITH SSO**
4646
You are redirected to the identity provider sign in page
47-
1. In the identity provider sign-in page, log in with the SSO user who you granted with access rules
48-
1. If you are unsuccessful signing-in to the identity provider, follow the Troubleshooting section below
47+
5. In the identity provider sign-in page, log in with the SSO user who you granted with access rules
48+
6. If you are unsuccessful signing-in to the identity provider, follow the Troubleshooting section below
4949

5050
### Editing the identity provider
5151

5252
You can view the identity provider details and edit its configuration:
5353

5454
1. Go to **Tools & Settings****General**
55-
1. Open the Security section
56-
1. On the identity provider box, click **Edit identity provider**
57-
1. You can edit either the **Discovery URL**, **Client ID**, **Client Secret**, **OIDC scopes**, or the **User attributes**
55+
2. Open the Security section
56+
3. On the identity provider box, click **Edit identity provider**
57+
4. You can edit either the **Discovery URL**, **Client ID**, **Client Secret**, **OIDC scopes**, or the **User attributes**
5858

59-
### Removing the identity provider**
59+
### Removing the identity provider
6060

6161
You can remove the identity provider configuration:
6262

6363
1. Go to **Tools & Settings****General**
64-
1. Open the Security section
65-
1. On the identity provider card, click **Remove identity provider**
66-
1. In the dialog, click **REMOVE** to confirm the action
64+
2. Open the Security section
65+
3. On the identity provider card, click **Remove identity provider**
66+
4. In the dialog, click **REMOVE** to confirm the action
6767

6868
!!! Note
6969
To avoid losing access, removing the identity provider must be carried out by a local user.
@@ -80,23 +80,23 @@ If testing the setup was unsuccessful, try the different troubleshooting scenari
8080
**Mitigation**:
8181

8282
1. Validate either the user or its related group/s are assigned with [access rules](../accessrules.md)
83-
1. Validate groups attribute is available in the configured OIDC Scopes
84-
1. Validate the user’s groups attribute is mapped correctly
83+
2. Validate groups attribute is available in the configured OIDC Scopes
84+
3. Validate the user’s groups attribute is mapped correctly
8585

8686
**Advanced:**
8787

8888
1. Open the Chrome DevTools: Right-click on page → Inspect → Console tab
89-
1. Run the following command to retrieve and paste the user’s token: `localStorage.token;`
90-
1. Paste in [https://jwt.io](https://jwt.io/)
91-
1. Under the Payload section validate the values of the user’s attributes
89+
2. Run the following command to retrieve and paste the user’s token: `localStorage.token;`
90+
3. Paste in [https://jwt.io](https://jwt.io/)
91+
4. Under the Payload section validate the values of the user’s attributes
9292

9393
??? "401 - We’re having trouble identifying your account because your email is incorrect or can’t be found."
9494
**Description:** Authentication failed because email attribute was not found.
9595

9696
**Mitigation**:
9797

9898
1. Validate email attribute is available in the configured OIDC Scopes
99-
1. Validate the user’s email attribute is mapped correctly
99+
2. Validate the user’s email attribute is mapped correctly
100100

101101
??? "Unexpected error when authenticating with identity provider"
102102

@@ -121,7 +121,7 @@ If testing the setup was unsuccessful, try the different troubleshooting scenari
121121
**Mitigation**:
122122

123123
1. Validate that the configured OIDC scope exists in the Identity Provider
124-
1. Validate the configured Client Secret match the Client Secret in the Identity Provider
124+
2. Validate the configured Client Secret match the Client Secret in the Identity Provider
125125

126126
**Advanced:**
127127

docs/admin/runai-setup/authentication/sso/openshift.md

Lines changed: 24 additions & 24 deletions
Original file line numberDiff line numberDiff line change
@@ -18,12 +18,12 @@ Follow the steps below to setup SSO with OpenShift.
1818
### Adding the identity provider
1919

2020
1. Go to **Tools & Settings****General**
21-
1. Open the Security section and click **+IDENTITY PROVIDER**
22-
1. Select **OpenShift V4**
23-
1. Enter the **Base URL**, Client ID, and **Client Secret** from your OpenShift OAuth client.
24-
1. Copy the Redirect URL to be used in your OpenShift OAuth client
25-
1. Optional: Enter the user attributes and their value in the identity provider (see the user attributes table below)
26-
1. Click **SAVE**
21+
2. Open the Security section and click **+IDENTITY PROVIDER**
22+
3. Select **OpenShift V4**
23+
4. Enter the **Base URL**, Client ID, and **Client Secret** from your OpenShift OAuth client.
24+
5. Copy the Redirect URL to be used in your OpenShift OAuth client
25+
6. Optional: Enter the user attributes and their value in the identity provider (see the user attributes table below)
26+
7. Click **SAVE**
2727
User attributes
2828

2929
| Attribute | Default value in Run:ai | Description |
@@ -39,30 +39,30 @@ Follow the steps below to setup SSO with OpenShift.
3939
### Testing the setup
4040

4141
1. Open the Run:ai platform as an admin
42-
1. Add [Access Rules](../accessrules.md) to an SSO user defined in the IDP
43-
1. Open the Run:ai platform in an incognito browser tab
44-
1. On the sign-in page click **CONTINUE WITH SSO**
42+
2. Add [Access Rules](../accessrules.md) to an SSO user defined in the IDP
43+
3. Open the Run:ai platform in an incognito browser tab
44+
4. On the sign-in page click **CONTINUE WITH SSO**
4545
You are redirected to the OpenShift IDP sign-in page
46-
1. In the identity provider sign-in page, log-in with the SSO user who you granted with access rules
47-
1. If you are unsuccessful signing-in to the identity provider, follow the Troubleshooting section below
46+
5. In the identity provider sign-in page, log-in with the SSO user who you granted with access rules
47+
6. If you are unsuccessful signing-in to the identity provider, follow the Troubleshooting section below
4848

4949
## Editing the identity provider
5050

5151
You can view the identity provider details and edit its configuration:
5252

5353
1. Go to **Tools & Settings****General**
54-
1. Open the Security section
55-
1. On the identity provider box, click **Edit identity provider**
56-
1. You can edit either the **Base URL**, **Client ID**, **Client Secret**, or the **User attributes**
54+
2. Open the Security section
55+
3. On the identity provider box, click **Edit identity provider**
56+
4. You can edit either the **Base URL**, **Client ID**, **Client Secret**, or the **User attributes**
5757

5858
### Removing the identity provider
5959

6060
You can remove the identity provider configuration:
6161

6262
1. Go to **Tools & Settings****General**
63-
1. Open the Security section
64-
1. On the identity provider card, click **Remove identity provider**
65-
1. In the dialog, click **REMOVE** to confirm the action
63+
2. Open the Security section
64+
3. On the identity provider card, click **Remove identity provider**
65+
4. In the dialog, click **REMOVE** to confirm the action
6666

6767
!!! Note
6868
To avoid losing access, removing the identity provider must be carried out by a local user.
@@ -79,23 +79,23 @@ If testing the setup was unsuccessful, try the different troubleshooting scenari
7979
**Mitigation**:
8080

8181
1. Validate either the user or its related group/s are assigned with [access rules](../accessrules.md)
82-
1. Validate groups attribute is available in the configured OIDC Scopes
83-
1. Validate the user’s groups attribute is mapped correctly
82+
2. Validate groups attribute is available in the configured OIDC Scopes
83+
3. Validate the user’s groups attribute is mapped correctly
8484

8585
**Advanced:**
8686

8787
1. Open the Chrome DevTools: Right-click on page → Inspect → Console tab
88-
1. Run the following command to retrieve and copy the user’s token: `localStorage.token;`
89-
1. Paste in [https://jwt.io](https://jwt.io/)
90-
1. Under the Payload section validate the value of the user’s attributes
88+
2. Run the following command to retrieve and copy the user’s token: `localStorage.token;`
89+
3. Paste in [https://jwt.io](https://jwt.io/)
90+
4. Under the Payload section validate the value of the user’s attributes
9191

9292
??? "401 - We’re having trouble identifying your account because your email is incorrect or can’t be found."
9393
**Description:** Authentication failed because e-mail attribute was not found.
9494

9595
**Mitigation**:
9696

9797
1. Validate email attribute is available in the configured OIDC Scopes
98-
1. Validate the user’s email attribute is mapped correctly
98+
2. Validate the user’s email attribute is mapped correctly
9999

100100
??? "Unexpected error when authenticating with identity provider"
101101
![](img/openshift-identityerror.png)
@@ -118,7 +118,7 @@ If testing the setup was unsuccessful, try the different troubleshooting scenari
118118
**Mitigation**:
119119

120120
1. Validate that the configured OIDC scope exists in the Identity Provider
121-
1. Validate that the configured Client Secret matches the Client Secret value in the OAuthclient Kubernetes object.
121+
2. Validate that the configured Client Secret matches the Client Secret value in the OAuthclient Kubernetes object.
122122

123123
**Advanced:**
124124

docs/admin/runai-setup/authentication/sso/saml.md

Lines changed: 15 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -86,10 +86,10 @@ If testing the setup was unsuccessful, try the different troubleshooting scenari
8686
**Description**: After trying to log-in, the following message is received in the RunLai log-in page.
8787
**Mitigation:**
8888
1. Go to the Tools & Settings menu
89-
1. Click **General**
90-
1. Open the Security section
91-
1. In the identity provider box, check for a "Certificate expired” error
92-
1. If it is expired, update the SAML metadata file to include a valid certificate
89+
2. Click **General**
90+
3. Open the Security section
91+
4. In the identity provider box, check for a "Certificate expired” error
92+
5. If it is expired, update the SAML metadata file to include a valid certificate
9393

9494
??? "401 - We’re having trouble identifying your account because your email is incorrect or can’t be found."
9595
**Description:** Authentication failed because email attribute was not found.
@@ -105,14 +105,14 @@ If testing the setup was unsuccessful, try the different troubleshooting scenari
105105
**Mitigation**:
106106

107107
1. Validate either the user or its related group/s are assigned with [access rules](../accessrules.md)
108-
1. Validate the user’s groups attribute is mapped correctly
108+
2. Validate the user’s groups attribute is mapped correctly
109109

110110
**Advanced:**
111111

112112
1. Open the Chrome DevTools: Right-click on page → Inspect → Console tab
113-
1. Run the following command to retrieve and paste the user’s token: `localStorage.token;`
114-
1. Paste in [https://jwt.io](https://jwt.io)
115-
1. Under the Payload section validate the values of the user’s attributes
113+
2. Run the following command to retrieve and paste the user’s token: `localStorage.token;`
114+
3. Paste in [https://jwt.io](https://jwt.io)
115+
4. Under the Payload section validate the values of the user’s attributes
116116

117117
### Advanced Troubleshooting
118118

@@ -126,15 +126,15 @@ If testing the setup was unsuccessful, try the different troubleshooting scenari
126126
Validate the SAML Request to ensure the SAML flow works as expected:
127127

128128
1. Go to the Run:ai login screen
129-
1. Open the Chrome Network inspector: Right-click → Inspect on the page → Network tab
130-
1. On the sign-in page click CONTINUE WITH SSO.
131-
1. Once redirected to the Identity Provider, search in the Chrome network inspector for an HTTP request showing the SAML Request. Depending on the IDP url, this would be a request to the IDP domain name. For example, `accounts.google.com/idp?1234`.
132-
1. When found, go to the Payload tab and copy the value of the SAML Request
133-
1. Paste the value into a SAML decoder (e.g. [https://www.samltool.com/decode.php](https://www.samltool.com/decode.php))
134-
1. Validate the request:
129+
2. Open the Chrome Network inspector: Right-click → Inspect on the page → Network tab
130+
3. On the sign-in page click CONTINUE WITH SSO.
131+
4. Once redirected to the Identity Provider, search in the Chrome network inspector for an HTTP request showing the SAML Request. Depending on the IDP url, this would be a request to the IDP domain name. For example, `accounts.google.com/idp?1234`.
132+
5. When found, go to the Payload tab and copy the value of the SAML Request
133+
6. Paste the value into a SAML decoder (e.g. [https://www.samltool.com/decode.php](https://www.samltool.com/decode.php))
134+
7. Validate the request:
135135
* The content of the `<saml:Issuer>` tag is the same as `Entity ID` given when adding the identity provider
136136
* The content of the `AssertionConsumerServiceURL` is the same as the `Redirect URI` given when adding the identity provider
137-
1. Validate the response:
137+
8. Validate the response:
138138
* The user email under the `<saml2:Subject>` tag is the same as the logged-in user
139139
* Make sure that under the `<saml2:AttributeStatement>` tag, there is an Attribute named `email` (lowercase). This attribute is mandatory.
140140
* If other, optional user attributes (`groups`, `firstName`, `lastName`, `uid`, `gid`) are mapped make sure they also exist under `<saml2:AttributeStatement>` along with their respective values.

docs/admin/runai-setup/config/non-root-containers.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -60,7 +60,7 @@ A best practice is to store the user identifier (UID) and the group identifier (
6060

6161
To perform this, you must:
6262

63-
* Set up [single sign-on](../authentication/sso.md). Perform the steps for UID/GID integration.
63+
* Set up [single sign-on](../authentication/authentication-overview.md). Perform the steps for UID/GID integration.
6464
* Run: `runai login` and enter your credentials
6565
* Use the flag --run-as-user
6666

docs/admin/runai-setup/config/overview.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ This section provides a list of installation-related articles dealing with a wid
1010
|---------------------------------------------------------|-----------|
1111
| [Designating Specific Role Nodes](node-roles.md) | Set one or more designated Run:ai system nodes or limit Run:ai monitoring and scheduling to specific nodes in the cluster. |
1212
| [Setup Project-based Researcher Access Control](../authentication/researcher-authentication.md) | Enable Run:ai access control is at the __Project__ level. |
13-
| [Single sign-on](../authentication/sso.md) | Integrate with the organization's Identity Provider to provide single sign-on for Run:ai |
13+
| [Single sign-on](../authentication/authentication-overview.md) | Integrate with the organization's Identity Provider to provide single sign-on for Run:ai |
1414
| [Review Kubernetes Access provided to Run:ai](access-roles.md) | In Restrictive Kubernetes environments such as when using OpenShift, understand and control what Kubernetes roles are provided to Run:ai |
1515
| [External access to Containers](allow-external-access-to-containers.md) | Understand the available options for Researchers to access containers from the outside |
1616
| [User Identity in Container](non-root-containers.md) | The identity of the user in the container determines its access to cluster resources. The document explains multiple way on how to propagate the user identity into the container. |

0 commit comments

Comments
 (0)