You signed in with another tab or window.Reload to refresh your session.You signed out in another tab or window.Reload to refresh your session.You switched accounts on another tab or window.Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: _docs/administration/single-sign-on/sso-google.md
+16-16Lines changed: 16 additions & 16 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -106,17 +106,17 @@ This concludes the basic SSO setup for Google. For team/group synchronization yo
106
106
107
107
##Synchronize teams with the Codefresh CLI
108
108
109
-
In the Codefresh configuration screen there are some optional fields that you can fill, in order to
110
-
get team synchronization via the Codefresh CLI.
109
+
In the Codefresh configuration screen there are some optional fields that you can fill, to configure team synchronization via the Codefresh CLI.
110
+
111
+
Based on your requirements, do one of the following:
111
112
112
-
You need to do the following:
113
-
114
-
* Create a service account and[delegate user and group permissions](https://developers.google.com/admin-sdk/directory/v1/guides/delegation) to it.
115
-
* Create a custom schema for user accounts, create a user role, and assign the user role to every user
116
-
* In Codefresh, configure the SAML sync settings to sync to the custom schema name
117
-
118
-
###Create a Service account from Google Console
113
+
* To sync_all users and groups_, create a service account and[delegate user and group permissions](https://developers.google.com/admin-sdk/directory/v1/guides/delegation) to it.
114
+
OR
115
+
To sync_only users who have been assigned the custom schema_, create a custom schema for user accounts, create a user role and assign the user role to every user
116
+
In Codefresh, configure the SAML sync settings to sync to the custom schema name
119
117
118
+
###Sync users with Service account from Google Console
119
+
To sync all
120
120
121
121
{% include image.html
122
122
lightbox="true"
@@ -144,16 +144,13 @@ caption="Creating a JSON key"
144
144
max-width="90%"
145
145
%}
146
146
147
-
148
-
149
-
150
147
Save the file locally. Go back to the Codefresh settings and fill in the fields
151
148
152
149
*`JSON Keyfile` - enter contents of the JSON file
153
150
*`Admin email` - The user that has access to`admin.google.com`
154
151
155
-
###Create acustom schemafor user accounts
156
-
In the Google Directory API and create the custom schema foruseraccounts.
152
+
###Sync users by assigningcustom schemato user accounts
153
+
Use this method to sync only those users who have been assigned theuserrole with the custom schema.
157
154
158
155
1. Navigate to the[Google Directory API](https://developers.google.com/admin-sdk/directory/v1/reference/schemas/insert?authuser=1).
159
156
1. Add the following schema:
@@ -185,7 +182,7 @@ max-width="40%"
185
182
186
183
{:start="4"}
187
184
1. Expand the Attribute Mapping settings, and add a Role attribute with the above schema for`SSO` and`UserRole`.
188
-
1. For every userin turn, in the User Information screen, scroll to`SSO > UserRole`, and assign the user role.
185
+
1. For every userto be synced, in the User Information screen, scroll to`SSO > UserRole`, and assign the user role.
189
186
190
187
{% include image.html
191
188
lightbox="true"
@@ -196,8 +193,11 @@ caption="User Information screen in GSuite"
196
193
max-width="40%"
197
194
%}
198
195
196
+
199
197
###Configure sync setting in Codefresh SAML
200
-
{:start="6"}
198
+
This is required only if you are syncing users via a custom schema.
199
+
200
+
201
201
1. In the Codefresh UI, open the SAML configuration screen.
202
202
1. In the`Sync` field, set the value to the custom schemaName.
Copy file name to clipboardExpand all lines: _docs/administration/single-sign-on/sso-setup-saml2.md
+3-1Lines changed: 3 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -80,10 +80,12 @@ Fill in the fields:
80
80
**IDP Entry* - The SSO endpoint of your Identity Provider. (Ex: For Azure SAML, this is the Login URL)
81
81
**Application Certificate* - The security certificate of your Identity Provider. Paste the value directly on the field. Do not convert to base64 or any other encoding by hand. (Ex: For Azure SAML, this will be Certificate (Base64) and the value needed is between the -----BEGIN ... and -----END... from the downloaded cert)
82
82
**Assertion URL* -`https://g.codefresh.io/api/auth/<your_codefresh_client_name>/callback` (where <your_codefresh_client_name> is taken from the SSO configuration you created on the section above. It was automatically generated by Codefresh after saving the SSO settings).
83
+
**Auto Sync users and teams to Codefresh* - This only works for Google / GSuite SAML integration.
84
+
When syncing users with custom schema, in the*Sync* field, add the custom schemaName. Otherwise, if you are syncing all users and groups, leave this field empty.
85
+
83
86
84
87
Click the*SAVE* button and make sure to note down the`Client Name` that was autogenerated.
85
88
86
-
>Notice: When viewing the SAML, there is a check box for Auto Sync users and teams to Codefresh. This only works for Google / GSuite SAML integration.
87
89
88
90
Then in the settings of your Identity Provider create a new Service Provider and provide the following: