Movatterモバイル変換


[0]ホーム

URL:


Skip to content

Navigation Menu

Sign in
Appearance settings

Search code, repositories, users, issues, pull requests...

Provide feedback

We read every piece of feedback, and take your input very seriously.

Saved searches

Use saved searches to filter your results more quickly

Sign up
Appearance settings

Commit52b2f0b

Browse files
committed
Update google and saml with reqs for custom schema sync
Added info on Sync field to SAML SSO, and updated Google SSO with sync option via all users or custom schema
1 parentbda1a51 commit52b2f0b

File tree

2 files changed

+19
-17
lines changed

2 files changed

+19
-17
lines changed

‎_docs/administration/single-sign-on/sso-google.md‎

Lines changed: 16 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -106,17 +106,17 @@ This concludes the basic SSO setup for Google. For team/group synchronization yo
106106

107107
##Synchronize teams with the Codefresh CLI
108108

109-
In the Codefresh configuration screen there are some optional fields that you can fill, in order to
110-
get team synchronization via the Codefresh CLI.
109+
In the Codefresh configuration screen there are some optional fields that you can fill, to configure team synchronization via the Codefresh CLI.
110+
111+
Based on your requirements, do one of the following:
111112

112-
You need to do the following:
113-
114-
* Create a service account and[delegate user and group permissions](https://developers.google.com/admin-sdk/directory/v1/guides/delegation) to it.
115-
* Create a custom schema for user accounts, create a user role, and assign the user role to every user
116-
* In Codefresh, configure the SAML sync settings to sync to the custom schema name
117-
118-
###Create a Service account from Google Console
113+
* To sync_all users and groups_, create a service account and[delegate user and group permissions](https://developers.google.com/admin-sdk/directory/v1/guides/delegation) to it.
114+
OR
115+
To sync_only users who have been assigned the custom schema_, create a custom schema for user accounts, create a user role and assign the user role to every user
116+
In Codefresh, configure the SAML sync settings to sync to the custom schema name
119117

118+
###Sync users with Service account from Google Console
119+
To sync all
120120

121121
{% include image.html
122122
lightbox="true"
@@ -144,16 +144,13 @@ caption="Creating a JSON key"
144144
max-width="90%"
145145
%}
146146

147-
148-
149-
150147
Save the file locally. Go back to the Codefresh settings and fill in the fields
151148

152149
*`JSON Keyfile` - enter contents of the JSON file
153150
*`Admin email` - The user that has access to`admin.google.com`
154151

155-
###Create acustom schemafor user accounts
156-
In the Google Directory API and create the custom schema foruseraccounts.
152+
###Sync users by assigningcustom schemato user accounts
153+
Use this method to sync only those users who have been assigned theuserrole with the custom schema.
157154

158155
1. Navigate to the[Google Directory API](https://developers.google.com/admin-sdk/directory/v1/reference/schemas/insert?authuser=1).
159156
1. Add the following schema:
@@ -185,7 +182,7 @@ max-width="40%"
185182

186183
{:start="4"}
187184
1. Expand the Attribute Mapping settings, and add a Role attribute with the above schema for`SSO` and`UserRole`.
188-
1. For every userin turn, in the User Information screen, scroll to`SSO > UserRole`, and assign the user role.
185+
1. For every userto be synced, in the User Information screen, scroll to`SSO > UserRole`, and assign the user role.
189186

190187
{% include image.html
191188
lightbox="true"
@@ -196,8 +193,11 @@ caption="User Information screen in GSuite"
196193
max-width="40%"
197194
%}
198195

196+
199197
###Configure sync setting in Codefresh SAML
200-
{:start="6"}
198+
This is required only if you are syncing users via a custom schema.
199+
200+
201201
1. In the Codefresh UI, open the SAML configuration screen.
202202
1. In the`Sync` field, set the value to the custom schemaName.
203203

‎_docs/administration/single-sign-on/sso-setup-saml2.md‎

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -80,10 +80,12 @@ Fill in the fields:
8080
**IDP Entry* - The SSO endpoint of your Identity Provider. (Ex: For Azure SAML, this is the Login URL)
8181
**Application Certificate* - The security certificate of your Identity Provider. Paste the value directly on the field. Do not convert to base64 or any other encoding by hand. (Ex: For Azure SAML, this will be Certificate (Base64) and the value needed is between the -----BEGIN ... and -----END... from the downloaded cert)
8282
**Assertion URL* -`https://g.codefresh.io/api/auth/<your_codefresh_client_name>/callback​` (where ​<your_codefresh_client_name>​ is taken from the SSO configuration you created on the section above. It was automatically generated by Codefresh after saving the SSO settings).
83+
**Auto Sync users and teams to Codefresh* - This only works for Google / GSuite SAML integration.
84+
When syncing users with custom schema, in the*Sync* field, add the custom schemaName. Otherwise, if you are syncing all users and groups, leave this field empty.
85+
8386

8487
Click the*SAVE* button and make sure to note down the`Client Name` that was autogenerated.
8588

86-
>Notice: When viewing the SAML, there is a check box for Auto Sync users and teams to Codefresh. This only works for Google / GSuite SAML integration.
8789

8890
Then in the settings of your Identity Provider create a new Service Provider and provide the following:
8991

0 commit comments

Comments
 (0)

[8]ページ先頭

©2009-2025 Movatter.jp