Security — OpenMetadata
The tdp-openmetadata chart supports basic authentication (default) and LDAP via openmetadata.config.authentication.*.
Basic Authentication (Default)
By default, OpenMetadata uses internal authentication with the user admin@open-metadata.org.
After the first login, change the administrator password through the UI.
Do not use the default password in production environments. Change it immediately after the first installation.
LDAP Configuration
Overview
OpenMetadata supports LDAP authentication as an alternative to the basic method.
The LDAP configuration is implemented through the overlay values-tdp-ldap.yaml, enabling integration with corporate LDAP directories.
Prerequisites
- LDAP server accessible from the Kubernetes cluster
- Bind DN with permissions to search users and groups
- Kubernetes Secret containing the bind DN password
Basic Configuration
1. Enable LDAP
In values.yaml:
ldap:
enabled: true
2. Configure LDAP Parameters
In values-tdp-ldap.yaml:
openmetadata:
openmetadata:
config:
authentication:
provider: ldap
ldapConfiguration:
host: "192.168.15.65" # LDAP server
port: 389 # Port (389 or 636 for LDAPS)
dnAdminPrincipal: "cn=admin,dc=claim,dc=local" # Admin DN
userBaseDN: "ou=users,dc=claim,dc=local" # User base DN
groupBaseDN: "ou=groups,dc=claim,dc=local" # Group base DN
mailAttributeName: mail # Email attribute
usernameAttributeName: mail # Login attribute
groupAttributeName: memberOf # Group attribute
sslEnabled: false # true for LDAPS
truststoreConfigType: TrustAll # Certificate validation
3. Create LDAP Password Secret
kubectl create secret generic tdp-openmetadata-ldap-secret \
--from-literal=bind-password=<LDAP_BIND_PASSWORD> \
-n <namespace>
Installation with LDAP
helm upgrade --install tdp-openmetadata \
oci://registry.tecnisys.com.br/tdp/charts/tdp-openmetadata \
-n <namespace> --create-namespace \
-f values.yaml \
-f values-tdp-ldap.yaml
Role Mapping (Optional)
To map LDAP groups to OpenMetadata roles:
ldapConfiguration:
authRolesMapping: '{"cn=tdp-admins,ou=groups,dc=claim,dc=local": ["Admin"]}'
Access with LDAP
- Port-forward:
kubectl -n <namespace> port-forward service/<release> 8585:8585
-
Open:
http://localhost:8585 -
Login: use the LDAP user's email and password.
For the full list of parameters, consult helm show values for the installed chart version and the official OpenMetadata documentation.