About 166 results
Open links in new tab
  1. Changing the default user credentials | DataHub

    You will still be able to log in using the default 'datahub:datahub' credentials. To safely delete the default credentials, please follow the guide provided below.

  2. Prerequisites for OIDC Authentication | DataHub

    Prerequisites for OIDC Authentication This guide will walk you through the following steps with your identity provider: Create and register an application with your identity provider. Obtain …

  3. Onboarding Users to DataHub

    User credentials can be managed via a JaaS Authentication configuration file containing static username and password combinations. By default, the credentials for the root 'datahub' users …

  4. DataHub Authentication Overview | DataHub

    Learn more about OAuth Provider authentication here. To learn more about DataHub's backend authentication, check out Introducing Metadata Service Authentication. Credentials must be …

  5. DataHub Quickstart Guide

    Default Credentials quickstart uses docker compose configuration which includes default credentials for both DataHub, and it's underlying prerequisite data stores, such as MySQL.

  6. Configuring OIDC Authentication | DataHub

    Before you do anything, you'll want to set up DataHub with your SSO provider, and get prerequisite credentials: Client ID - A unique identifier for your application with the identity …

  7. Metadata Ingestion | DataHub

    This makes it simple to connect to popular platforms like Snowflake, BigQuery, dbt, and more, schedule automatic updates, and manage credentials securely. Prerequisites and Permissions

  8. Vertex AI - DataHub

    To provide credentials to the source, you can either: Set an environment variable:

  9. DataHub CLI | DataHub

    We do not collect private information such as IP addresses, contents of ingestions, or credentials. The code responsible for collecting and broadcasting these events is open-source and can be …

  10. Concepts & Key Components | DataHub

    A recommended approach to operationalize guest access is, first, create a designated guest user account with login credentials, but keep guest access disabled. This allows you to configure …