Replies: 5 comments 1 reply
-
|
Hi ivraju! 👋 Welcome, and thank you for opening your first issue in the repo! Please wait for triaging by our maintainers. As development is carried out in our spare time, you can support us by sponsoring our activities or even funding the development of specific issues. If you plan to raise a PR for this issue, please take a look at our contributing guide. |
Beta Was this translation helpful? Give feedback.
-
|
don't see scope "groups" in your config my working config: |
Beta Was this translation helpful? Give feedback.
-
|
@fallen-up appreciate you responding. I did try to scope to groups and roles-field: "groups" previously. However when I do that my Okta SSO login breaks (as shown in the screenshot ). Also since we have other configs with name groups already we used Groups3 as the claim name. When I scope it to Groups3 I got the same result.
|
Beta Was this translation helpful? Give feedback.
-
|
Can't really help here as we don't have/use okta, but I'm 99% confident it's a configuration issue (either in okta or the app settings). There are multiple successful cases with okta working fine reported occasionally, both here and on our Discord. To further debug the mysterious "Invalid credentials" do this:
|
Beta Was this translation helpful? Give feedback.
-
|
@Haarolean Thanks for the quick response. It turned out to be an issue with the Okta settings, and it’s resolved now. Thanks |
Beta Was this translation helpful? Give feedback.

Uh oh!
There was an error while loading. Please reload this page.
-
Issue submitter TODO list
main-labeled docker image and the issue still persists thereDescribe the bug (actual behavior)
We are encountering an issue where Okta-based RBAC roles are not being recognized or applied as expected within the Kafka UI (Kafbat) OAuth2 configuration. Despite a valid OAuth2 setup and successful authentication via Okta, the assigned user groups are not mapping correctly to the configured RBAC roles in the application.
The configuration is managed through Terraform and YAML application configuration, as shown below
Observed Behavior
Expected behavior
After successful OAuth2 authentication, Okta user group mappings (e.g., aws_sso_devops) should align with the RBAC configuration, automatically granting corresponding permissions (view, messages_read, etc.).
Your installation details
Steps to reproduce
Screenshots
Okta configuration:
Logs
No response
Additional context
No response
Beta Was this translation helpful? Give feedback.
All reactions