Movatterモバイル変換


[0]ホーム

URL:


Skip to content

Navigation Menu

Sign in
Appearance settings

Search code, repositories, users, issues, pull requests...

Provide feedback

We read every piece of feedback, and take your input very seriously.

Saved searches

Use saved searches to filter your results more quickly

Sign up
Appearance settings

Commit050cb6d

Browse files
committed
Update oidc and sso shared config
1 parentf04c329 commit050cb6d

File tree

7 files changed

+87
-348
lines changed

7 files changed

+87
-348
lines changed

‎_docs/administration/account-user-management/add-users.md‎

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,11 +1,12 @@
11
---
22
title:"Users and team management"
3-
description:""
3+
description:"Add users and teams to Codefresh accounts"
44
group:administration
55
toc:true
66
---
77

88
Once you have created a Codefresh account, you can add any number of users to collaborate on repositories, workflows, and pipelines, and teams of users.
9+
You can then create teams in Codefresh to group users who share a common denominator, such as the same permissions, access to the same functionality, or roles. Teams make it easy for administrators to both define and manage items shared by multiple users in an orgranization.
910

1011

1112
##Users in Codefresh
@@ -43,7 +44,7 @@ Once you add a user to your Codefresh account, you can do the following to manag
4344

4445

4546
##Teams in Codefresh
46-
Teams are users who share the same permissions, roles, or as requiredby. By default there are two teams,*users*, and*admins* with users[invited as collaborators]({{site.baseurl}}/docs/accounts/invite-your-team-member/).
47+
Teams are users who share the same permissions, roles, or as requiredbased on company processes. By default there are two teams,*users*, and*admins* with users[invited as collaborators]({{site.baseurl}}/docs/accounts/invite-your-team-member/).
4748
Teams allow you to enforce access control through ABAC ().
4849

4950
>Only Enterprise customers can add new teams. Other Codefresh plans can only use the predefined*Users* and*Admin* teams.[Contact us](https://codefresh.io/contact-us/) if you wish to upgrade to an Enterprise plan.

‎_docs/administration/account-user-management/oauth-setup.md‎

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title:"Set upOAuth2 authentication for Git providers"
2+
title:"OAuth2 authentication for Git providers"
33
description:""
44
group:administration
55
toc:true

‎_docs/administration/account-user-management/platform-ip-addresses.md‎

Lines changed: 10 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -8,11 +8,11 @@ toc: true
88
Access to Kubernetes clusters behind strict firewalls not accessible from the public internet is governed through authorized IP addresses.
99
Codefresh provides a list of IP addresses to be configured on clusters to allow access to them.
1010

11-
You can register multiple external clusters to Codefreshruntimes, both hostedandhybrid. Allruntimes require Codefresh platform IPs to be configured on the clusters.
12-
In addition, managed clusters registered tohosted runtimes must be configured with a set of specific IP addresses to authorize access.
11+
You can register multiple external clusters totheCodefreshRunner,andGitOps Runtimes. AllRuntimes require Codefresh platform IPs to be configured on the clusters.
12+
In addition, managed clusters registered toHosted GitOps Runtimes must be configured with a set of specific IP addresses to authorize access.
1313

1414

15-
###Codefresh platform IPs (updated July 31st 2021)
15+
##Codefresh platform IPs (updated July 31st 2021)
1616

1717
All the IPs are NAT gateways, and need to enable specific IPs instead of ranges.
1818

@@ -38,13 +38,13 @@ All the IPs are NAT gateways, and need to enable specific IPs instead of ranges.
3838
- 44.238.167.159
3939
- 44.237.63.217
4040

41-
###Codefresh IPs for managed clusters inhosted runtimes
41+
##Codefresh IPs for managed clusters inHosted GitOps Runtimes
4242

4343
- 34.207.5.18
4444
- 34.232.79.230
4545
- 44.193.43.5
4646

47-
###Define API access to IPs for clusters
47+
##Define API access to IPs for clusters
4848
Clusters must be configured with API access to the authorized Codefresh IPs.
4949
If you haven't configured your clusters with the required IPs, use the links below to complete the configuration for the clusters listed:
5050

@@ -54,7 +54,8 @@ If you haven't configured your clusters with the required IPs, use the links bel
5454

5555
[GKE (Google Kubernetes Engine)](https://cloud.google.com/kubernetes-engine/docs/how-to/private-clusters){:target="\_blank"}
5656

57-
###What to read next
58-
[Set up a hosted (Hosted GitOps) environment]({{site.baseurl}}/docs/runtime/hosted-runtime/)
59-
[Install hybrid runtimes]({{site.baseurl}}/docs/runtime/installation/)
60-
[Codefresh architecture]({{site.baseurl}}/docs/getting-started/architecture/)
57+
##What to read next
58+
[Codefresh Runner installation]({{site.baseurl}}/docs/installation/codefresh-runner/)
59+
[Set up a Hosted GitOps Runtime]({{site.baseurl}}/docs/installation/hosted-runtime/)
60+
[Install Hybrid GitOps Runtimes]({{site.baseurl}}/docs/runtime/hybrid-gitops/)
61+
<!---[Codefresh architecture]({{site.baseurl}}/docs/getting-started/architecture/)-->
Lines changed: 34 additions & 161 deletions
Original file line numberDiff line numberDiff line change
@@ -1,90 +1,45 @@
11
---
2-
title:"OpenID Connect"
3-
description:"Setting UpOpenID ConnectFederated Single Sign-On (SSO)"
2+
title:"Setting upOpenID Connect (OIDC) Federated Single Sign-On (SSO)"
3+
description:"OpenID Connect SSO setup"
44
group:single-sign-on
55
toc:true
66
---
77

8-
Codefresh natively supports login using GitHub, Bitbucket and GitLab using the OpenID Connect (OAUTH 2.0) protocol. This guide will review how to add SSO integrations based on OAUTH 2.0 as part of Codefresh Enterprise plan.
8+
Codefresh natively supports login using GitHub, Bitbucket and GitLab using the OpenID Connect (OAuth2) protocol.
9+
910

1011
##Prerequisites
1112

12-
In order toadd successfully an identityProvider in Codefresh you need to do some preparatory work with both Codefresh and the provider.
13+
Toadd successfully an identityprovider (IdP) in Codefresh you need to do some preparatory work with both Codefresh and the provider.
1314

14-
1. You need to inform yourIdentify provider that it will provide SSO services to Codefresh
15-
1. You need to set up Codefresh and point it to yourIdentity Provider.
15+
1. You need to inform yourIdP that it will provide SSO services to Codefresh
16+
1. You need to set up Codefresh and point it to yourIdP.
1617

1718
The first procedure differs according to you Identity Provider, but the second one is common for all providers.
1819

19-
Note thatSSO is only available to Enterprise customers. Please[contact sales](https://codefresh.io/contact-sales/) in order to enable it for your Codefresh account.
20+
>SSO is only available to Enterprise customers. Please[contact sales](https://codefresh.io/contact-sales/) in order to enable it for your Codefresh account.
2021
21-
##Identity Provider options
22+
##OIDC SSO configuration in Codefresh
2223

23-
Codefresh currently supports
24+
Here's what you need to do to configure SSO via OIDC in Codefresh:
2425

25-
* Auth0
26-
* Azure
27-
* Google
28-
* Okta
29-
* OneLogin
26+
1. Configure SSO settings for the IdP in Codefresh:
27+
This generally includes defining settings both in Codefresh and in the IdP.
28+
Codefresh supports OIDC SSO for the following:
29+
*[Auth0]({{site.baseurl}}/docs/single-sign-on/oidc/oidc-auth0/)
30+
*[Azure]({{site.baseurl}}/docs/single-sign-on/oidc/oidc-azure/)
31+
*[Google]({{site.baseurl}}/docs/single-sign-on/oidc/oidc-google/)
32+
*[Okta]({{site.baseurl}}/docs/single-sign-on/oidc/oidc-okta/)
33+
*[OneLogin]({{site.baseurl}}/docs/single-sign-on/oidc/oidc-onelogin/)
3034

31-
To access the SSO configuration at the account level.
35+
1. Test integration with the IdP
36+
37+
>Before enabling SSO for users, you**MUST** make sure that it is working for the test user. If SSO is enabled for a user, Codefresh blocks logins through other IDPs for this user and only the enabled SSO is allowed. If the selected SSO method does not work for some reason, the user will be locked out of Codefresh.
3238
33-
1. Click on your avatar at the top right of the GUI and select*Account settings*.
34-
1. In the new screen, select*Single Sign-on* from the left sidebar.
35-
36-
{% include image.html
37-
lightbox="true"
38-
file="/images/administration/sso/add-sso-dropdown.png"
39-
url="/images/administration/sso/add-sso-dropdown.png"
40-
alt="SSO provider settings"
41-
caption="SSO provider settings"
42-
max-width="70%"
43-
%}
44-
45-
{:start="3"}
46-
1. To connect an Identity Provider, click the*add single-sign-on* button and select your provider from the drop-down menu.
47-
48-
##Codefresh SSO setup
49-
50-
Regardless of the Identity Provider that you have chosen, the setup in Codefresh is similar for all of them. You need to provide several fields to Codefresh to activate SSO. The common ones are:
51-
52-
**Display Name* - A name for your Identity Provider
53-
**Client ID* - An ID that will be used for the connection
54-
**Client Secret* - A secret associated with the ID
55-
56-
Some providers also need additional fields which are specific to that provider.
57-
58-
The process to obtain the values for these fields depends on the individual Identity Provider. In the following
59-
sections we will outline the details for each one.
60-
61-
###Setting Auth0 as an Identity provider
62-
63-
See the[Auth0 instructions]({{site.baseurl}}/docs/single-sign-on/oidc/oidc-auth0/).
64-
65-
###Setting Azure as an Identity provider
66-
67-
See the[Azure instructions]({{site.baseurl}}/docs/single-sign-on/oidc/oidc-azure/).
68-
69-
###Setting Google as an Identity provider
70-
71-
See the[Google instructions]({{site.baseurl}}/docs/single-sign-on/oidc/oidc-google/).
72-
73-
###Setting Okta as an Identity Provider
74-
75-
See the[Okta instructions]({{site.baseurl}}/docs/single-sign-on/oidc/oidc-okta/).
76-
77-
###Setting OneLogin as an Identity Provider
78-
79-
See the[OneLogin instructions]({{site.baseurl}}/docs/single-sign-on/oidc/oidc-onelogin/).
80-
81-
##Testing your Identity provider
82-
83-
Once you set up the Identity Provider, do the following
84-
85-
1. Go to the collaborators screen by clicking on*People* on the left sidebar (under User Management).
86-
1. Add an active user that will be used for testing. We recommend you use your own user.
87-
1. Change Login method by selecting your Auth provider from the SSO drop-down.
39+
1. In the Codefresh UI, on the toolbar, click the**Settings** icon and then select**Account Settings**.
40+
1. From the sidebar, below Access & Collaboration, select[**Users & Teams**](https://g.codefresh.io/2.0/account-settings/single-sign-on){:target="\_blank"}.
41+
1. Add an active user to be used for testing. We recommend you use your own user.
42+
1. Change Login method by selecting your Auth provider from the SSO drop-down.
8843

8944
{% include image.html
9045
lightbox="true"
@@ -95,7 +50,8 @@ Once you set up the Identity Provider, do the following
9550
max-width="70%"
9651
%}
9752

98-
1. Keep the current browser session open, and log in via Corporate SSO in an incognito tab (or another browser).
53+
{:start="5"}
54+
1. Keep the current browser session open, and log in via Corporate SSO in an incognito tab (or another browser).
9955

10056
{% include image.html
10157
lightbox="true"
@@ -106,95 +62,12 @@ Once you set up the Identity Provider, do the following
10662
max-width="50%"
10763
%}
10864

109-
1. If everything works, add more users.
110-
111-
>Before enabling SSO for all users, you**MUST** make sure that it is working for the test user, because if SSO is enabled for a user, Codefresh blocks logins through other IDPs for this user and only the enabled SSO is allowed. If the selected SSO method does not work for some reason, users will be locked out of Codefresh.
112-
113-
##Selecting SSO method for collaborators
114-
115-
To add users and select their SSO method, go to*Collaborators* from the left sidebar. Then add the email or Codefresh username of a user.
116-
117-
In addition to their role you can now select the SSO method they will use
118-
119-
{% include image.html
120-
lightbox="true"
121-
file="/images/administration/sso/select-user-sso.png"
122-
url="/images/administration/sso/select-user-sso.png"
123-
alt="Selecting SSO method"
124-
caption="Selecting SSO method"
125-
max-width="50%"
126-
%}
127-
128-
**SSO login for new and existing users**
129-
If you have multiple SSO providers configured, you can select a different provider for each user if so required.
130-
131-
* New users
132-
If you have an SSO provider selected as the default, that provider is automatically assigned to new users, added either manually or via team synchronization.
133-
134-
* Existing users
135-
SSO login is not configured by default for existing users. You must_explicitly select_ the SSO provider for existing users.
136-
If SSO login is already configured for an existing user, and you add a new identity provider, to change the SSO login to the new provider, you must_select_ the new provider for the user.
137-
138-
139-
##Setting a default provider
140-
141-
If you have multiple SSO providers set you can hover your mouse on the top right of the SSO screen
142-
and setup one of them as the default provider.
143-
144-
{% include image.html
145-
lightbox="true"
146-
file="/images/administration/sso/default-sso.png"
147-
url="/images/administration/sso/default-sso.png"
148-
alt="Default SSO provider"
149-
caption="Default SSO provider"
150-
max-width="90%"
151-
%}
152-
153-
If a default sso provider is set then:
154-
155-
1. This SSO method will be automatically assigned to all new invited users
156-
1. All new users will receive an email with an invite link that points them directly to the login page of that SSO provider
157-
158-
##Syncing of teams after initial SSO setup
159-
160-
Once the initial setup is done, you can also sync your teams between Codefresh and the Identity provider.
161-
You can do this via the[Codefresh Cli](https://codefresh-io.github.io/cli/) and specifically the[sync command](https://codefresh-io.github.io/cli/teams/synchronize-teams/).
162-
163-
For example, to sync you azure teams you can execute
164-
165-
```bash
166-
codefresh synchronize teams my-client-name -t azure
167-
```
168-
169-
You can find the client-name from the SSO UI.
170-
171-
{% include image.html
172-
lightbox="true"
173-
file="/images/administration/sso/azure/client-name.png"
174-
url="/images/administration/sso/azure/client-name.png"
175-
alt="SSO Client Name"
176-
caption="SSO Client Name"
177-
max-width="40%"
178-
%}
179-
180-
Even though you can run this command manually it makes more sense to run it periodically as a job. And the obvious
181-
way to perform this, is with a Codefresh pipeline. The CLI can be used as a[freestyle step]({{site.baseurl}}/docs/codefresh-yaml/steps/freestyle/).
182-
183-
You can create a git repository with a[codefresh.yml]({{site.baseurl}}/docs/codefresh-yaml/what-is-the-codefresh-yaml/) file with the following contents:
184-
185-
`YAML`
186-
{% highlight yaml %}
187-
{% raw %}
188-
version: '1.0'
189-
steps:
190-
syncMyTeams:
191-
title: syncTeams
192-
image: codefresh/cli
193-
commands:
194-
- 'codefresh synchronize teams my-client-name -t azure'
195-
{% endraw %}
196-
{% endhighlight %}
65+
1. (Optional)[Set an IdP as the default provider]({{site.baseurl}}/docs/single-sign-on/team-sync/#set-a-default-sso-provider-for-account)
66+
You can select an IdP as the default SSO provider for a Codefresh account. This means that all the new users added to that account will automatically use the selected IdP for signin.
67+
1. (Optional)[Set the SSO method for each user]({{site.baseurl}}/docs/single-sign-on/team-sync/#select-sso-method-for-individual-users)
68+
You can also select if needed, a different SSO provider for every user or for specific users.
19769

198-
To fully automate this pipeline you should set a[cron trigger]({{site.baseurl}}/docs/configure-ci-cd-pipeline/triggers/cron-triggers/) for this pipeline. The cron-trigger will be responsibleforrunning this pipeline (and therefore synchronizing the teams) in a fully automated manner.
70+
>Codefresh has an internal cache for SSO configuration, and it can take up to five minutesforyour changes to take effect.
19971
200-
This way you can synchronize your teams every day/week/hour depending on you cron trigger setup.
72+
##Related articles
73+
[Federated Single Sign-On (SSO) overview]({{site.baseurl}}/docs/administration/single-sign-on)

‎_docs/administration/single-sign-on/saml-setup.md‎

Lines changed: 37 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -71,7 +71,7 @@ Once Federated SSO has been configured, the process works as follows:
7171
Here's what you need to do to configure SSO via SAML in Codefresh:
7272

7373
1. Configure SSO settings for the IdP in Codefresh:
74-
This generally includes defining settings in Codefresh and in the IdP.
74+
This generally includes defining settings inboth inCodefresh and in the IdP.
7575
Codefresh supports SAML SSO for the following:
7676
*[JumpCloud]({{site.baseurl}}/docs/administration/single-sign-on/saml/saml-jumpcloud)
7777
*[Okta]({{site.baseurl}}/docs/administration/single-sign-on/saml/saml-okta)
@@ -91,19 +91,45 @@ Here's what you need to do to configure SSO via SAML in Codefresh:
9191

9292
>These settings are for the SaaS version of Codefresh. For an on-premises setup, use the URLs that match your installation.
9393
94-
1. Test integration
95-
Test the integrations to verify the connection settings.
96-
97-
1. Set an IdP as the default provider
98-
99-
1. Set the SSO for each user
94+
1. Test integration with the IdP
95+
96+
>Before enabling SSO for users, you**MUST** make sure that it is working for the test user. If SSO is enabled for a user, Codefresh blocks logins through other IDPs for this user and only the enabled SSO is allowed. If the selected SSO method does not work for some reason, the user will be locked out of Codefresh.
97+
98+
1. In the Codefresh UI, on the toolbar, click the**Settings** icon and then select**Account Settings**.
99+
1. From the sidebar, below Access & Collaboration, select[**Users & Teams**](https://g.codefresh.io/2.0/account-settings/single-sign-on){:target="\_blank"}.
100+
1. Add an active user to be used for testing. We recommend you use your own user.
101+
1. Change Login method by selecting your Auth provider from the SSO drop-down.
102+
103+
{% include image.html
104+
lightbox="true"
105+
file="/images/administration/sso/collaborators.png"
106+
url="/images/administration/sso/collaborators.png"
107+
alt="Adding collaborators"
108+
caption="Adding collaborators"
109+
max-width="70%"
110+
%}
111+
112+
{:start="5"}
113+
1. Keep the current browser session open, and log in via Corporate SSO in an incognito tab (or another browser).
114+
115+
{% include image.html
116+
lightbox="true"
117+
file="/images/administration/sso/sign-with-sso.png"
118+
url="/images/administration/sso/sign-with-sso.png"
119+
alt="Sign-in with SSO"
120+
caption="Sign-in with SSO"
121+
max-width="50%"
122+
%}
123+
124+
1. (Optional)[Set an IdP as the default provider]({{site.baseurl}}/docs/single-sign-on/team-sync/#set-a-default-sso-provider-for-account)
125+
You can select an IdP as the default SSO provider for a Codefresh account. This means that all the new users added to that account will automatically use the selected IdP for signin.
126+
1. (Optional)[Set the SSO method for each user]({{site.baseurl}}/docs/single-sign-on/team-sync/#select-sso-method-for-individual-users)
127+
You can also select if needed, a different SSO provider for every user or for specific users.
100128

101129
>Codefresh has an internal cache for SSO configuration, and it can take up to five minutes for your changes to take effect.
102130
103-
104-
105-
106-
*[Selecting SSO method for collaborators]({{site.baseurl}}/docs/administration/single-sign-on/sso-setup-oauth2/#selecting-sso-method-for-collaborators) -->
131+
##Related articles
132+
[Federated Single Sign-On (SSO) overview]({{site.baseurl}}/docs/administration/single-sign-on)
107133

108134

109135

0 commit comments

Comments
 (0)

[8]ページ先頭

©2009-2025 Movatter.jp