Skip to content

Commit

Permalink
Merge pull request #1 from manics/pr515
Browse files Browse the repository at this point in the history
Explain auth.github.org_whitelist
  • Loading branch information
choldgraf authored Feb 26, 2018
2 parents 52e732d + 818b688 commit 252b671
Showing 1 changed file with 18 additions and 3 deletions.
21 changes: 18 additions & 3 deletions doc/source/authentication.rst
Original file line number Diff line number Diff line change
Expand Up @@ -46,15 +46,30 @@ Below is the structure to use in order to authenticate with GitHub.
clientId: "y0urg1thubc1ient1d"
clientSecret: "an0ther1ongs3cretstr1ng"
callbackUrl: "http://<your_jupyterhub_host>/hub/oauth_callback"
By default this will allow *any* GitHub user to access your JupyterHub.
You can restrict access to members of one or more GitHub organisations.

.. code-block:: yaml
auth:
type: github
github:
...
org_whitelist:
- "SomeOrgName"
scopes:
- "read:org"
.. note::

The ``org_whitelist`` section is optional, it lets you only allow users from particular GitHub
organizations that you list. Enabling it will require users to accept the read:org github OAuth scope when
logging in. If it is *not* included, then all GitHub users will be allowed to access your JupyterHub.
``auth.scopes`` is optional.
Without this members of an organisation must `set their membership to Public <https://help.github.com/articles/publicizing-or-hiding-organization-membership/>`_ to login.
If this is set to ``read:org`` private members can login, but users must grant JupyterHub `additional privileges <https://developer.github.com/apps/building-oauth-apps/scopes-for-oauth-apps/>`_ to read some private information.
Changing ``auth.scopes`` will not change the scope for existing OAuth tokens, you must invalidate them.


Google
^^^^^^
Expand Down

0 comments on commit 252b671

Please sign in to comment.