Authenticating with OAuth 2
Now that we’ve covered our local LDAP authentication, we’ll cover three examples that all use the OAuth 2 authentication standard. It is beyond the scope of this book to go into detail about the OAuth 2 standard but suffice to say it represents one of the most popular industry standards for application authentication. To use OAuth 2 to provide Grafana authentication, rather than running a lookup service, we will leverage external providers. We will look at three different popular services, each providing similar setup techniques but serving slightly different audiences.
In each case, we’ll go through the typical workflow for registering the Grafana application to secure a known key, then configuring Grafana to use the key to perform the necessary trusted authentication after a user has logged into a provider account.
Without going into the specifics, the process for each implementation of OAuth 2 is relatively consistent:
-
...