Google

There are three different ways to integrate Argo CD login with your Google Workspace users. Generally the OpenID Connect (oidc) method would be the recommended way of doing this integration (and easier, as well…), but depending on your needs, you may choose a different option.

Once you’ve set up one of the above integrations, be sure to edit argo-rbac-cm to configure permissions (as in the example below). See RBAC Configurations for more detailed scenarios.

  1. apiVersion: v1
  2. kind: ConfigMap
  3. metadata:
  4. name: argocd-rbac-cm
  5. namespace: argocd
  6. data:
  7. policy.default: role:readonly

OpenID Connect using Dex

If you’ve never configured this, you’ll be redirected straight to this if you try to create an OAuth Client ID

  1. Go to your OAuth Consent configuration. If you still haven’t created one, select Internal or External and click Create
  2. Go and edit your OAuth consent screen Verify you’re in the correct project!
  3. Configure a name for your login app and a user support email address
  4. The app logo and filling the information links is not mandatory, but it’s a nice touch for the login page
  5. In “Authorized domains” add the domains who are allowed to log in to ArgoCD (e.g. if you add example.com, all Google Workspace users with an @example.com address will be able to log in)
  6. Save to continue to the “Scopes” section
  7. Click on “Add or remove scopes” and add the .../auth/userinfo.profile and the openid scopes
  8. Save, review the summary of your changes and finish

Configure a new OAuth Client ID

  1. Go to your Google API Credentials console, and make sure you’re in the correct project.
  2. Click on “+Create Credentials”/“OAuth Client ID”
  3. Select “Web Application” in the Application Type drop down menu, and enter an identifying name for your app (e.g. Argo CD)
  4. Fill “Authorized JavaScript origins” with your Argo CD URL, e.g. https://argocd.example.com
  5. Fill “Authorized redirect URIs” with your Argo CD URL plus /api/dex/callback, e.g. https://argocd.example.com/api/dex/callback

    Google - 图1

  6. Click “Create” and save your “Client ID” and your “Client Secret” for later

Configure Argo to use OpenID Connect

Edit argo-cm and add the following dex.config to the data section, replacing clientID and clientSecret with the values you saved before:

  1. data:
  2. url: https://argocd.example.com
  3. dex.config: |
  4. connectors:
  5. - config:
  6. issuer: https://accounts.google.com
  7. clientID: XXXXXXXXXXXXX.apps.googleusercontent.com
  8. clientSecret: XXXXXXXXXXXXX
  9. type: oidc
  10. id: google
  11. name: Google

References

SAML App Auth using Dex

Configure a new SAML App


Deprecation Warning

Note that, according to Dex documentation, SAML is considered unsafe and they are planning to deprecate that module.


  1. In the Google admin console, open the left-side menu and select Apps > SAML Apps

    Google Admin Apps Menu

  2. Under Add App select Add custom SAML app

    Google Admin Add Custom SAML App

  3. Enter a Name for the application (e.g. Argo CD), then choose Continue

    Google Admin Apps Menu

  4. Download the metadata or copy the SSO URL, Certificate, and optionally Entity ID from the identity provider details for use in the next section. Choose continue.

    • Base64 encode the contents of the certificate file, for example:
    • $ cat ArgoCD.cer | base64
    • Keep a copy of the encoded output to be used in the next section.
    • Ensure that the certificate is in PEM format before base64 encoding

    Google Admin IdP Metadata

  5. For both the ACS URL and Entity ID, use your Argo Dex Callback URL, for example: https://argocd.example.com/api/dex/callback

    Google Admin Service Provider Details

  6. Add SAML Attribute Mapping, Map Primary email to name and Primary Email to email. and click ADD MAPPING button.

    Google Admin SAML Attribute Mapping Details

  7. Finish creating the application.

Configure Argo to use the new Google SAML App

Edit argo-cm and add the following dex.config to the data section, replacing the caData, argocd.example.com, sso-url, and optionally google-entity-id with your values from the Google SAML App:

  1. data:
  2. url: https://argocd.example.com
  3. dex.config: |
  4. connectors:
  5. - type: saml
  6. id: saml
  7. name: saml
  8. config:
  9. ssoURL: https://sso-url (e.g. https://accounts.google.com/o/saml2/idp?idpid=Abcde0)
  10. entityIssuer: https://argocd.example.com/api/dex/callback
  11. caData: |
  12. BASE64-ENCODED-CERTIFICATE-DATA
  13. redirectURI: https://argocd.example.com/api/dex/callback
  14. usernameAttr: name
  15. emailAttr: email
  16. # optional
  17. ssoIssuer: https://google-entity-id (e.g. https://accounts.google.com/o/saml2?idpid=Abcde0)

References

OpenID Connect plus Google Groups using Dex


Limited group information

When using this feature you’ll only receive the list of groups the user is a direct member.

So, lets say you have this hierarchy of groups and subgroups:
all@example.com --> tech@example.com --> devs@example.com --> you@example.com
The only group you would receive through Dex would be devs@example.com


We’re going to use Dex’s google connector to get additional Google Groups information from your users, allowing you to use group membership on your RBAC, i.e., giving admin role to the whole sysadmins@yourcompany.com group.

This connector uses two different credentials:

  • An oidc client ID and secret
    Same as when you’re configuring an OpenID connection, this authenticates your users
  • A Google service account
    This is used to connect to the Google Directory API and pull information about your user’s group membership

Also, you’ll need the email address for an admin user on this domain. Dex will impersonate that user identity to fetch user information from the API.

Configure OpenID Connect

Go through the same steps as in OpenID Connect using Dex, except for configuring argocd-cm. We’ll do that later.

Set up Directory API access

  1. Follow Google instructions to create a service account with Domain-Wide Delegation
    • When assigning API scopes to the service account assign only the https://www.googleapis.com/auth/admin.directory.group.readonly scope and nothing else. If you assign any other scopes, you won’t be able to fetch information from the API
    • Create the credentials in JSON format and store them in a safe place, we’ll need them later
  2. Enable the Admin SDK

Configure Dex

  1. Create a secret with the contents of the previous json file encoded in base64, like this:

    1. apiVersion: v1
    2. kind: Secret
    3. metadata:
    4. name: argocd-google-groups-json
    5. namespace: argocd
    6. data:
    7. googleAuth.json: JSON_FILE_BASE64_ENCODED
  2. Edit your argocd-dex-server deployment to mount that secret as a file

    • Add a volume mount in /spec/template/spec/containers/0/volumeMounts/ like this. Be aware of editing the running container and not the init container!

      1. volumeMounts:
      2. - mountPath: /shared
      3. name: static-files
      4. - mountPath: /tmp
      5. name: dexconfig
      6. - mountPath: /tmp/oidc
      7. name: google-json
      8. readOnly: true
    • Add a volume in /spec/template/spec/volumes/ like this:

      1. volumes:
      2. - emptyDir: {}
      3. name: static-files
      4. - emptyDir: {}
      5. name: dexconfig
      6. - name: google-json
      7. secret:
      8. defaultMode: 420
      9. secretName: argocd-google-groups-json
  3. Edit argo-cm and add the following dex.config to the data section, replacing clientID and clientSecret with the values you saved before, adminEmail with the address for the admin user you’re going to impersonate, and editing redirectURI with your Argo CD domain:

    1. dex.config: |
    2. connectors:
    3. - config:
    4. redirectURI: https://argocd.example.com/api/dex/callback
    5. clientID: XXXXXXXXXXXXX.apps.googleusercontent.com
    6. clientSecret: XXXXXXXXXXXXX
    7. serviceAccountFilePath: /tmp/oidc/googleAuth.json
    8. adminEmail: admin-email@example.com
    9. type: google
    10. id: google
    11. name: Google
  4. Restart your argocd-dex-server deployment to be sure it’s using the latest configuration

  5. Login to Argo CD and go to the “User info” section, were you should see the groups you’re member
    User info

  6. Now you can use groups email addresses to give RBAC permissions

References