You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: src/current/cockroachcloud/configure-cloud-org-sso.md
+39Lines changed: 39 additions & 0 deletions
Original file line number
Diff line number
Diff line change
@@ -162,6 +162,14 @@ You can add a custom authentication method to connect to any IdP that supports [
162
162
163
163
### OIDC
164
164
165
+
#### Supported features
166
+
167
+
* IdP-initiated SSO
168
+
* SP-initiated SSO
169
+
* Just-In-Time provisioning
170
+
171
+
#### Configuration steps
172
+
165
173
To configure a custom OIDC authentication method, you need the following information from your IdP:
166
174
167
175
- Issuer URL
@@ -193,8 +201,32 @@ These instructions work for Okta. If you use a different IdP, refer to its docum
193
201
1. The authentication method has been added but is disabled. To enable it, toggle **Enable**.
194
202
1. Optionally, [configure advanced settings](#configure-advanced-settings) for the new authentication method.
195
203
204
+
#### SP-initiated SSO
205
+
1. Navigate to CockroachDB Cloud Console via your organization's vanity URL.
206
+
2. Select the appropriate login method which uses OIDC. You will be redirected to your IdP (e.g. Okta).
207
+
3. Log in using your IdP credentials.
208
+
4. You will then be automatically redirected and logged into your CockroachDB Cloud Console organization.
209
+
196
210
### SAML
197
211
212
+
#### Supported features
213
+
214
+
* IdP-initiated SSO
215
+
* SP-initiated SSO
216
+
* Just-In-Time provisioning
217
+
218
+
#### Supported SAML Attributes
219
+
220
+
CockroachDB Cloud expects the following SAML attribute mappings from your IdP:
221
+
222
+
| Name | Value |
223
+
| --------- | ---------------- |
224
+
| email | user.email |
225
+
| name | user.displayName |
226
+
227
+
228
+
#### Configuration steps
229
+
198
230
To configure a custom SAML authentication method, you need the following information from your IdP:
199
231
200
232
- Sign On URL
@@ -234,6 +266,13 @@ After SAML is configured, your users can sign in to the CockroachDB {{ site.data
234
266
-**Service provider-initiated flow**: Users sign in to the CockroachDB {{ site.data.products.cloud }} Console directly, using your custom sign-in URL.
235
267
-**Identity provider-initiated flow**: Users sign in to the CockroachDB {{ site.data.products.cloud }} Console from within your IdP (for example, by accessing its tile in Okta).
236
268
269
+
#### SP-initiated SSO
270
+
1. Navigate to CockroachDB Cloud Console via your organization's vanity URL.
271
+
2. Select the appropriate login method which uses SAML. You will be redirected to your IdP (e.g. Okta).
272
+
3. Log in using your IdP credentials.
273
+
4. You will then be automatically redirected and logged into your CockroachDB Cloud Console organization.
274
+
275
+
237
276
## Require SSO
238
277
239
278
To begin enforcing a requirement to sign in using SSO:
Copy file name to clipboardExpand all lines: src/current/cockroachcloud/configure-scim-provisioning.md
+29-1Lines changed: 29 additions & 1 deletion
Original file line number
Diff line number
Diff line change
@@ -33,6 +33,16 @@ Okta disables deprovisioned users and does not support deleting them.
33
33
34
34
<aid="scim-group-push"></a>
35
35
36
+
### Supported features
37
+
38
+
* Create users
39
+
* Update user attributes
40
+
* Deactivate users
41
+
* Import users
42
+
* Import groups
43
+
* Profile sourcing (Management of certain user fields from the IdP)
44
+
* Group push
45
+
36
46
### SCIM Group Push with Okta
37
47
38
48
User accounts are provisioned in CockroachDB {{ site.data.products.cloud }} based on assignments in the SCIM app integration. Assigning an IAM group to the app integration is equivalent to assigning each of the group's members individually. However, depending on your IdP, assigning a group to the app integration may or may not automatically create a corresponding group in CockroachDB {{ site.data.products.cloud }} or keep its list of members in sync. Additional configuration of your IdP may be required. If you use Okta, you must enable [Group Push](#automate-group-management) to create and link groups in CockroachDB {{ site.data.products.cloud }}.
@@ -69,7 +79,25 @@ The exact steps and requirements for enabling SCIM provisioning depend upon your
69
79
- The endpoint to the CockroachDB {{ site.data.products.cloud }} SCIM API, `https://cockroachlabs.cloud/api/scim/v2`.
70
80
- The API token of a CockroachDB {{ site.data.products.cloud }} service account with the [**Org Administrator**]({% link cockroachcloud/authorization.md %}#org-administrator) role.
71
81
72
-
To add SCIM provisioning to a SAML app integration in Okta:
82
+
83
+
Depending on your setup, you can configure SCIM either via the Okta Integration Network (OIN) for a standardized app or manually for a custom SAML app integration.
84
+
85
+
### Add SCIM integration using Okta Integration Network (OIN)
86
+
87
+
1. Log in to Okta Admin Dashboard as an admin user.
1. Go to **Provisioning** Tab and click **Configure API Integration**.
94
+
1. Check **Enable API integration**.
95
+
1. Provide <b>API authentication token</b>: the API token for a CockroachDB {{ site.data.products.cloud }} <ahref="managing-access.html#create-a-service-account">service account</a> with the <ahref="authorization.html#org-administrator"><b>Org Administrator</b></a> role.
96
+
1.**Test API Credentials** > Click **Save**.
97
+
1. Click **To App**. This tab controls assignment of Okta identities to CockroachDB {{ site.data.products.cloud }}. To allow provisioning and deprovisioning of users, ensure that **Create Users** and **Deactivate Users** are selected, and make any other desired changes.
98
+
1. Optionally, click **To Okta**. This tab allows you to import a CockroachDB {{ site.data.products.cloud }} organization's existing users into Okta. This helps to maintain an updated list of IAM users when an organization creates IAM users in a variety of ways. Refer to Okta's documentation about mapping individual fields. Make any desired changes.
99
+
100
+
### Add SCIM provisioning to a SAML app integration in Okta
73
101
74
102
1. Log in to Okta Admin Dashboard as an admin user.
75
103
1. Click **Applications** and edit the [SAML]({% link cockroachcloud/configure-cloud-org-sso.md %}#saml) app integration for your CockroachDB {{ site.data.products.cloud }} organization.
0 commit comments