2022-06-15 07:51:47 +00:00
---
title: "Grafana"
2022-07-01 03:07:02 +00:00
description: "Integrating Grafana with the Authelia OpenID Connect Provider."
2022-06-15 07:51:47 +00:00
lead: ""
2022-06-28 05:27:14 +00:00
date: 2022-06-15T17:51:47+10:00
2022-06-15 07:51:47 +00:00
draft: false
images: []
menu:
integration:
parent: "openid-connect"
weight: 620
toc: true
community: true
---
## Tested Versions
* [Authelia]
* [v4.35.5 ](https://github.com/authelia/authelia/releases/tag/v4.35.5 )
* [Grafana]
* 8.0.0
## Before You Begin
You are required to utilize a unique client id and a unique and random client secret for all [OpenID Connect] relying
parties. You should not use the client secret in this example, you should randomly generate one yourself. You may also
choose to utilize a different client id, it's completely up to you.
This example makes the following assumptions:
* __Application Root URL:__ `https://grafana.example.com`
* __Authelia Root URL:__ `https://auth.example.com`
* __Client ID:__ `grafana`
* __Client Secret:__ `grafana_client_secret`
## Configuration
### Application
2022-08-26 01:42:12 +00:00
To configure [Grafana] to utilize Authelia as an [OpenID Connect] Provider, you either need to edit the config file, or specify overrides in the containers environment variables.
2022-06-15 07:51:47 +00:00
2022-08-26 01:42:12 +00:00
#### Method 1: Configuration Files
2022-06-15 07:51:47 +00:00
1. Add the following Generic OAuth configuration to the [Grafana] configuration:
```ruby
2022-07-31 03:23:41 +00:00
[server]
root_url = https://grafana.example.com
2022-06-15 07:51:47 +00:00
[auth.generic_oauth]
enabled = true
name = Authelia
icon = signin
client_id = grafana
client_secret = grafana_client_secret
scopes = openid profile email groups
empty_scopes = false
auth_url = https://auth.example.com/api/oidc/authorization
token_url = https://auth.example.com/api/oidc/token
api_url = https://auth.example.com/api/oidc/userinfo
login_attribute_path = preferred_username
groups_attribute_path = groups
name_attribute_path = name
use_pkce = true
```
2022-08-26 01:42:12 +00:00
#### Method 2: Container Environment Variables
**GF_AUTH_GENERIC_OAUTH_NAME=**`Authelia`
**GF_AUTH_GENERIC_OAUTH_ENABLED=**`true`
**GF_AUTH_GENERIC_OAUTH_ALLOW_SIGN_UP=**`true`
**GF_AUTH_GENERIC_OAUTH_CLIENT_ID=**`grafana`
**GF_AUTH_GENERIC_OAUTH_CLIENT_SECRET=**`grafana_client_secret`
**GF_AUTH_GENERIC_OAUTH_SCOPES=**`openid profile email groups`
**GF_AUTH_GENERIC_OAUTH_EMAIL_ATTRIBUTE_NAME=**`email`
**GF_AUTH_GENERIC_OAUTH_AUTH_URL=**`https://auth.example.com/api/oidc/authorization`
**GF_AUTH_GENERIC_OAUTH_TOKEN_URL=**`https://auth.example.com/api/oidc/token`
**GF_AUTH_GENERIC_OAUTH_API_URL=**`https://auth.example.com/api/oidc/userinfo`
**GF_AUTH_GENERIC_OAUTH_TLS_SKIP_VERIFY_INSECURE=**`true`
**GF_AUTH_GENERIC_OAUTH_EMPTY_SCOPES=**`false`
**GF_AUTH_GENERIC_OAUTH_ICON=**`signin`
**GF_AUTH_GENERIC_OAUTH_LOGIN_ATTRIBUTE_PATH=**`preferred_username`
**GF_AUTH_GENERIC_OAUTH_GROUPS_ATTRIBUTE_PATH=**`groups`
**GF_AUTH_GENERIC_OAUTH_NAME_ATTRIBUTE_PATH=**`name`
**GF_AUTH_GENERIC_OAUTH_USE_PKCE=**`true`
2022-06-15 07:51:47 +00:00
### Authelia
The following YAML configuration is an example __Authelia__
[client configuration ](../../../configuration/identity-providers/open-id-connect.md#clients ) for use with [Grafana]
which will operate with the above example:
```yaml
- id: grafana
secret: grafana_client_secret
public: false
authorization_policy: two_factor
scopes:
- openid
- profile
- groups
- email
redirect_uris:
- https://grafana.example.com/login/generic_oauth
userinfo_signing_algorithm: none
```
## See Also
* [Grafana OAuth Documentation ](https://grafana.com/docs/grafana/latest/auth/generic-oauth/ )
[Authelia]: https://www.authelia.com
[Grafana]: https://grafana.com/
[OpenID Connect]: ../../openid-connect/introduction.md