Skip to content

Overview

System administrators can integrate their environment with their corporate Identity Provider (IdP) via SAML 2.0.

The SSO login process validates the user's credentials against the corporate user directory managed by the Identity Provider (IdP). A successful validation ensures that users can access the console without a separate login.

The integration with SAML 2.0 IdPs supports both IdP and SP initiated flows.

Important

Only privileged users with the System Admin role are authorized to view, configure, and manage this setting.


How SSO Works

The platform supports SSO by implementing federated authentication using Security Assertion Markup Language (SAML) version 2.0.

To enable SSO, a system administrator must configure the environment to work with the Identity Provider (IdP). The IdP maintains a record of all usernames and their passwords in an encrypted format.

For every login attempt, the console sends SAML requests to the configured IdP login URL. The IdP validates the request and sends a SAML assertion back to the console.


Service Provider Initiated Flow

With the SP initiated flow, the user accesses the console first and is redirected to the configured Identity Provider (IdP) for authentication and optional authorization.

sequenceDiagram
    participant User
    participant Controller
    participant Identity Provider

    User->>Controller: Access Org(s)
    Note right of Controller: SSO enabled for Org(s)?
    Controller-->>User: Provides Org name if associated with multiple Orgs
    Controller-->>User: Redirect User to IdP

    rect rgb(230, 250, 250)
    User->>Identity Provider: User Credentials
    Note right of Identity Provider: Authenticate User
    Identity Provider-->>User: Send Assertion & Group Info
    end

    User-->>Controller: IdP Assertion
    Note right of Controller: Map Group to Roles
    Controller-->>User: Provide Role based Access