You signed in with another tab or window.Reload to refresh your session.You signed out in another tab or window.Reload to refresh your session.You switched accounts on another tab or window.Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: _docs/administration/account-user-management/add-users.md
+3-2Lines changed: 3 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,11 +1,12 @@
1
1
---
2
2
title:"Users and team management"
3
-
description:""
3
+
description:"Add users and teams to Codefresh accounts"
4
4
group:administration
5
5
toc:true
6
6
---
7
7
8
8
Once you have created a Codefresh account, you can add any number of users to collaborate on repositories, workflows, and pipelines, and teams of users.
9
+
You can then create teams in Codefresh to group users who share a common denominator, such as the same permissions, access to the same functionality, or roles. Teams make it easy for administrators to both define and manage items shared by multiple users in an orgranization.
9
10
10
11
11
12
##Users in Codefresh
@@ -43,7 +44,7 @@ Once you add a user to your Codefresh account, you can do the following to manag
43
44
44
45
45
46
##Teams in Codefresh
46
-
Teams are users who share the same permissions, roles, or as requiredby. By default there are two teams,*users*, and*admins* with users[invited as collaborators]({{site.baseurl}}/docs/accounts/invite-your-team-member/).
47
+
Teams are users who share the same permissions, roles, or as requiredbased on company processes. By default there are two teams,*users*, and*admins* with users[invited as collaborators]({{site.baseurl}}/docs/accounts/invite-your-team-member/).
47
48
Teams allow you to enforce access control through ABAC ().
48
49
49
50
>Only Enterprise customers can add new teams. Other Codefresh plans can only use the predefined*Users* and*Admin* teams.[Contact us](https://codefresh.io/contact-us/) if you wish to upgrade to an Enterprise plan.
Copy file name to clipboardExpand all lines: _docs/administration/account-user-management/platform-ip-addresses.md
+10-9Lines changed: 10 additions & 9 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -8,11 +8,11 @@ toc: true
8
8
Access to Kubernetes clusters behind strict firewalls not accessible from the public internet is governed through authorized IP addresses.
9
9
Codefresh provides a list of IP addresses to be configured on clusters to allow access to them.
10
10
11
-
You can register multiple external clusters to Codefreshruntimes, both hostedandhybrid. Allruntimes require Codefresh platform IPs to be configured on the clusters.
12
-
In addition, managed clusters registered tohosted runtimes must be configured with a set of specific IP addresses to authorize access.
11
+
You can register multiple external clusters totheCodefreshRunner,andGitOps Runtimes. AllRuntimes require Codefresh platform IPs to be configured on the clusters.
12
+
In addition, managed clusters registered toHosted GitOps Runtimes must be configured with a set of specific IP addresses to authorize access.
13
13
14
14
15
-
###Codefresh platform IPs (updated July 31st 2021)
15
+
##Codefresh platform IPs (updated July 31st 2021)
16
16
17
17
All the IPs are NAT gateways, and need to enable specific IPs instead of ranges.
18
18
@@ -38,13 +38,13 @@ All the IPs are NAT gateways, and need to enable specific IPs instead of ranges.
38
38
- 44.238.167.159
39
39
- 44.237.63.217
40
40
41
-
###Codefresh IPs for managed clusters inhosted runtimes
41
+
##Codefresh IPs for managed clusters inHosted GitOps Runtimes
42
42
43
43
- 34.207.5.18
44
44
- 34.232.79.230
45
45
- 44.193.43.5
46
46
47
-
###Define API access to IPs for clusters
47
+
##Define API access to IPs for clusters
48
48
Clusters must be configured with API access to the authorized Codefresh IPs.
49
49
If you haven't configured your clusters with the required IPs, use the links below to complete the configuration for the clusters listed:
50
50
@@ -54,7 +54,8 @@ If you haven't configured your clusters with the required IPs, use the links bel
description:"Setting UpOpenID ConnectFederated Single Sign-On (SSO)"
2
+
title:"Setting upOpenID Connect (OIDC) Federated Single Sign-On (SSO)"
3
+
description:"OpenID Connect SSO setup"
4
4
group:single-sign-on
5
5
toc:true
6
6
---
7
7
8
-
Codefresh natively supports login using GitHub, Bitbucket and GitLab using the OpenID Connect (OAUTH 2.0) protocol. This guide will review how to add SSO integrations based on OAUTH 2.0 as part of Codefresh Enterprise plan.
8
+
Codefresh natively supports login using GitHub, Bitbucket and GitLab using the OpenID Connect (OAuth2) protocol.
9
+
9
10
10
11
##Prerequisites
11
12
12
-
In order toadd successfully an identityProvider in Codefresh you need to do some preparatory work with both Codefresh and the provider.
13
+
Toadd successfully an identityprovider (IdP) in Codefresh you need to do some preparatory work with both Codefresh and the provider.
13
14
14
-
1. You need to inform yourIdentify provider that it will provide SSO services to Codefresh
15
-
1. You need to set up Codefresh and point it to yourIdentity Provider.
15
+
1. You need to inform yourIdP that it will provide SSO services to Codefresh
16
+
1. You need to set up Codefresh and point it to yourIdP.
16
17
17
18
The first procedure differs according to you Identity Provider, but the second one is common for all providers.
18
19
19
-
Note thatSSO is only available to Enterprise customers. Please[contact sales](https://codefresh.io/contact-sales/) in order to enable it for your Codefresh account.
20
+
>SSO is only available to Enterprise customers. Please[contact sales](https://codefresh.io/contact-sales/) in order to enable it for your Codefresh account.
20
21
21
-
##Identity Provider options
22
+
##OIDC SSO configuration in Codefresh
22
23
23
-
Codefresh currently supports
24
+
Here's what you need to do to configure SSO via OIDC in Codefresh:
24
25
25
-
* Auth0
26
-
* Azure
27
-
* Google
28
-
* Okta
29
-
* OneLogin
26
+
1. Configure SSO settings for the IdP in Codefresh:
27
+
This generally includes defining settings both in Codefresh and in the IdP.
To access the SSO configuration at the account level.
35
+
1. Test integration with the IdP
36
+
37
+
>Before enabling SSO for users, you**MUST** make sure that it is working for the test user. If SSO is enabled for a user, Codefresh blocks logins through other IDPs for this user and only the enabled SSO is allowed. If the selected SSO method does not work for some reason, the user will be locked out of Codefresh.
32
38
33
-
1. Click on your avatar at the top right of the GUI and select*Account settings*.
34
-
1. In the new screen, select*Single Sign-on* from the left sidebar.
1. To connect an Identity Provider, click the*add single-sign-on* button and select your provider from the drop-down menu.
47
-
48
-
##Codefresh SSO setup
49
-
50
-
Regardless of the Identity Provider that you have chosen, the setup in Codefresh is similar for all of them. You need to provide several fields to Codefresh to activate SSO. The common ones are:
51
-
52
-
**Display Name* - A name for your Identity Provider
53
-
**Client ID* - An ID that will be used for the connection
54
-
**Client Secret* - A secret associated with the ID
55
-
56
-
Some providers also need additional fields which are specific to that provider.
57
-
58
-
The process to obtain the values for these fields depends on the individual Identity Provider. In the following
59
-
sections we will outline the details for each one.
60
-
61
-
###Setting Auth0 as an Identity provider
62
-
63
-
See the[Auth0 instructions]({{site.baseurl}}/docs/single-sign-on/oidc/oidc-auth0/).
64
-
65
-
###Setting Azure as an Identity provider
66
-
67
-
See the[Azure instructions]({{site.baseurl}}/docs/single-sign-on/oidc/oidc-azure/).
68
-
69
-
###Setting Google as an Identity provider
70
-
71
-
See the[Google instructions]({{site.baseurl}}/docs/single-sign-on/oidc/oidc-google/).
72
-
73
-
###Setting Okta as an Identity Provider
74
-
75
-
See the[Okta instructions]({{site.baseurl}}/docs/single-sign-on/oidc/oidc-okta/).
76
-
77
-
###Setting OneLogin as an Identity Provider
78
-
79
-
See the[OneLogin instructions]({{site.baseurl}}/docs/single-sign-on/oidc/oidc-onelogin/).
80
-
81
-
##Testing your Identity provider
82
-
83
-
Once you set up the Identity Provider, do the following
84
-
85
-
1. Go to the collaborators screen by clicking on*People* on the left sidebar (under User Management).
86
-
1. Add an active user that will be used for testing. We recommend you use your own user.
87
-
1. Change Login method by selecting your Auth provider from the SSO drop-down.
39
+
1. In the Codefresh UI, on the toolbar, click the**Settings** icon and then select**Account Settings**.
40
+
1. From the sidebar, below Access & Collaboration, select[**Users & Teams**](https://g.codefresh.io/2.0/account-settings/single-sign-on){:target="\_blank"}.
41
+
1. Add an active user to be used for testing. We recommend you use your own user.
42
+
1. Change Login method by selecting your Auth provider from the SSO drop-down.
88
43
89
44
{% include image.html
90
45
lightbox="true"
@@ -95,7 +50,8 @@ Once you set up the Identity Provider, do the following
95
50
max-width="70%"
96
51
%}
97
52
98
-
1. Keep the current browser session open, and log in via Corporate SSO in an incognito tab (or another browser).
53
+
{:start="5"}
54
+
1. Keep the current browser session open, and log in via Corporate SSO in an incognito tab (or another browser).
99
55
100
56
{% include image.html
101
57
lightbox="true"
@@ -106,95 +62,12 @@ Once you set up the Identity Provider, do the following
106
62
max-width="50%"
107
63
%}
108
64
109
-
1. If everything works, add more users.
110
-
111
-
>Before enabling SSO for all users, you**MUST** make sure that it is working for the test user, because if SSO is enabled for a user, Codefresh blocks logins through other IDPs for this user and only the enabled SSO is allowed. If the selected SSO method does not work for some reason, users will be locked out of Codefresh.
112
-
113
-
##Selecting SSO method for collaborators
114
-
115
-
To add users and select their SSO method, go to*Collaborators* from the left sidebar. Then add the email or Codefresh username of a user.
116
-
117
-
In addition to their role you can now select the SSO method they will use
If you have multiple SSO providers configured, you can select a different provider for each user if so required.
130
-
131
-
* New users
132
-
If you have an SSO provider selected as the default, that provider is automatically assigned to new users, added either manually or via team synchronization.
133
-
134
-
* Existing users
135
-
SSO login is not configured by default for existing users. You must_explicitly select_ the SSO provider for existing users.
136
-
If SSO login is already configured for an existing user, and you add a new identity provider, to change the SSO login to the new provider, you must_select_ the new provider for the user.
137
-
138
-
139
-
##Setting a default provider
140
-
141
-
If you have multiple SSO providers set you can hover your mouse on the top right of the SSO screen
142
-
and setup one of them as the default provider.
143
-
144
-
{% include image.html
145
-
lightbox="true"
146
-
file="/images/administration/sso/default-sso.png"
147
-
url="/images/administration/sso/default-sso.png"
148
-
alt="Default SSO provider"
149
-
caption="Default SSO provider"
150
-
max-width="90%"
151
-
%}
152
-
153
-
If a default sso provider is set then:
154
-
155
-
1. This SSO method will be automatically assigned to all new invited users
156
-
1. All new users will receive an email with an invite link that points them directly to the login page of that SSO provider
157
-
158
-
##Syncing of teams after initial SSO setup
159
-
160
-
Once the initial setup is done, you can also sync your teams between Codefresh and the Identity provider.
161
-
You can do this via the[Codefresh Cli](https://codefresh-io.github.io/cli/) and specifically the[sync command](https://codefresh-io.github.io/cli/teams/synchronize-teams/).
162
-
163
-
For example, to sync you azure teams you can execute
164
-
165
-
```bash
166
-
codefresh synchronize teams my-client-name -t azure
Even though you can run this command manually it makes more sense to run it periodically as a job. And the obvious
181
-
way to perform this, is with a Codefresh pipeline. The CLI can be used as a[freestyle step]({{site.baseurl}}/docs/codefresh-yaml/steps/freestyle/).
182
-
183
-
You can create a git repository with a[codefresh.yml]({{site.baseurl}}/docs/codefresh-yaml/what-is-the-codefresh-yaml/) file with the following contents:
184
-
185
-
`YAML`
186
-
{% highlight yaml %}
187
-
{% raw %}
188
-
version: '1.0'
189
-
steps:
190
-
syncMyTeams:
191
-
title: syncTeams
192
-
image: codefresh/cli
193
-
commands:
194
-
- 'codefresh synchronize teams my-client-name -t azure'
195
-
{% endraw %}
196
-
{% endhighlight %}
65
+
1. (Optional)[Set an IdP as the default provider]({{site.baseurl}}/docs/single-sign-on/team-sync/#set-a-default-sso-provider-for-account)
66
+
You can select an IdP as the default SSO provider for a Codefresh account. This means that all the new users added to that account will automatically use the selected IdP for signin.
67
+
1. (Optional)[Set the SSO method for each user]({{site.baseurl}}/docs/single-sign-on/team-sync/#select-sso-method-for-individual-users)
68
+
You can also select if needed, a different SSO provider for every user or for specific users.
197
69
198
-
To fully automate this pipeline you should set a[cron trigger]({{site.baseurl}}/docs/configure-ci-cd-pipeline/triggers/cron-triggers/) for this pipeline. The cron-trigger will be responsibleforrunning this pipeline (and therefore synchronizing the teams) in a fully automated manner.
70
+
>Codefresh has an internal cache for SSO configuration, and it can take up to five minutesforyour changes to take effect.
199
71
200
-
This way you can synchronize your teams every day/week/hour depending on you cron trigger setup.
72
+
##Related articles
73
+
[Federated Single Sign-On (SSO) overview]({{site.baseurl}}/docs/administration/single-sign-on)
@@ -91,19 +91,45 @@ Here's what you need to do to configure SSO via SAML in Codefresh:
91
91
92
92
>These settings are for the SaaS version of Codefresh. For an on-premises setup, use the URLs that match your installation.
93
93
94
-
1. Test integration
95
-
Test the integrations to verify the connection settings.
96
-
97
-
1. Set an IdP as the default provider
98
-
99
-
1. Set the SSO for each user
94
+
1. Test integration with the IdP
95
+
96
+
>Before enabling SSO for users, you**MUST** make sure that it is working for the test user. If SSO is enabled for a user, Codefresh blocks logins through other IDPs for this user and only the enabled SSO is allowed. If the selected SSO method does not work for some reason, the user will be locked out of Codefresh.
97
+
98
+
1. In the Codefresh UI, on the toolbar, click the**Settings** icon and then select**Account Settings**.
99
+
1. From the sidebar, below Access & Collaboration, select[**Users & Teams**](https://g.codefresh.io/2.0/account-settings/single-sign-on){:target="\_blank"}.
100
+
1. Add an active user to be used for testing. We recommend you use your own user.
101
+
1. Change Login method by selecting your Auth provider from the SSO drop-down.
1. (Optional)[Set an IdP as the default provider]({{site.baseurl}}/docs/single-sign-on/team-sync/#set-a-default-sso-provider-for-account)
125
+
You can select an IdP as the default SSO provider for a Codefresh account. This means that all the new users added to that account will automatically use the selected IdP for signin.
126
+
1. (Optional)[Set the SSO method for each user]({{site.baseurl}}/docs/single-sign-on/team-sync/#select-sso-method-for-individual-users)
127
+
You can also select if needed, a different SSO provider for every user or for specific users.
100
128
101
129
>Codefresh has an internal cache for SSO configuration, and it can take up to five minutes for your changes to take effect.
102
130
103
-
104
-
105
-
106
-
*[Selecting SSO method for collaborators]({{site.baseurl}}/docs/administration/single-sign-on/sso-setup-oauth2/#selecting-sso-method-for-collaborators) -->
131
+
##Related articles
132
+
[Federated Single Sign-On (SSO) overview]({{site.baseurl}}/docs/administration/single-sign-on)