Movatterモバイル変換


[0]ホーム

URL:


Skip to content

Navigation Menu

Sign in
Appearance settings

Search code, repositories, users, issues, pull requests...

Provide feedback

We read every piece of feedback, and take your input very seriously.

Saved searches

Use saved searches to filter your results more quickly

Sign up
Appearance settings

Commit84c0ff7

Browse files
Adding SSO docs
1 parent0f1f5f9 commit84c0ff7

File tree

6 files changed

+128
-0
lines changed

6 files changed

+128
-0
lines changed

‎_data/nav.yml‎

Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -287,6 +287,16 @@
287287
-title:Jenkins Integration
288288
url:"/jenkins-integration"
289289

290+
-title:Single Sign-On
291+
url:"/sso"
292+
pages:
293+
-title:Federated Single Sign-On Overview
294+
url:"/federated-sso-overview"
295+
-title:Setting Up SAML2 Federated Single Sign-On (SSO)
296+
url:"/sso-setup-saml2"
297+
-title:Setting Up OpenID Connect Federated Single Sign-On (SSO)
298+
url:"/sso-setup-oauth2"
299+
290300
-title:Accounts
291301
url:"/accounts"
292302
pages:
Lines changed: 41 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,41 @@
1+
---
2+
title:"Federated Single Sign-On (SSO) Overview"
3+
description:""
4+
group:sso
5+
permalink:/:collection/sso/federated-sso-overview/
6+
toc:true
7+
---
8+
9+
Federated identity management enables the cross organizational exchange of identity information across Internet domains, without migrating credential information or consolidating several security domains. With federation, Codefresh customers can authenticate with their corporate credentials to gain access to Codefresh.
10+
11+
Customers in our**enterprise plan** can log in to Codefresh using Federated Single Sign-On (SSO). This means that you will be able to access your Codefresh account by signing with your corporate credentials.
12+
To set up Federated SSO, your organization identity management must use either of the following:
13+
14+
-**A security Assertion Markup Language 2.0 (SAML 2.0)** compliant Identity Provider (IdP) that is configured to communicate with Codefresh Service Provider (SP). For example, ADFS, Auth0, Okta and Ping Identity.
15+
16+
-**OpenID Connect (OAuth 2.0)** identity mangement. For example, Google, Github, Bitbucket and Gitlab.
17+
18+
This enables seamless SSO from a browser, by asserting the identity of the user to Codefresh.
19+
20+
A SAML2 based federated system comprises the following main components:
21+
22+
-**Identity Provider (IdP)** – The identity provider belongs in the corporation that manages accounts for a large number of users who need secure Internet access to the services or Web- based applications of another organization. In our case a customer's organization that requires access to Codefresh.
23+
- The IdP manages the corporate users, and integrates with Identity Management systems in the customers organization responsible for authentication. The Identity Management systems will integrate with authentication providers such as LDAP or AD.
24+
- All user authentication is carried out via Identity Management systems integrated with the IdP
25+
- For successfully authenticated users, the IdP sends a SAML assertion to Codefresh service provider that enables the user to access Codefresh.
26+
27+
-**Service Provider (SP)** – An SP belongs in the SaaS provider that wants to provide access to its web applications and services.
28+
- The SP trusts a corporate IdP to manage users and the authentication process.
29+
- The SP does not manage an organization’s users, but it trusts the IdP to manage user authentication.
30+
31+
A trust must be set up between the customer IdP and Codefresh SP. Once a trust has been set up and a user has been authenticated via the IdP using corporate credentials, the user can access Codefresh.
32+
33+
{:.text-secondary}
34+
##Why use Federated SSO
35+
36+
Using federated SSO significantly simplifies cross-domain user management as follows:
37+
38+
- You use your corporate credentials to access Codefresh.That means you can access all your systems with one password.
39+
- There is no need to migrate identity information or consolidate between the two security domains.
40+
- Corporate credentials aren't exposed to the SaaS provider.
41+

‎_docs/sso/sso-setup-oatuh2.md‎

Lines changed: 12 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,12 @@
1+
---
2+
title:"Setting Up OpenID Connect Federated Single Sign-On (SSO)"
3+
description:""
4+
group:sso
5+
permalink:/:collection/sso/sso-setup-oauth2/
6+
toc:true
7+
---
8+
9+
Codefresh natively supports login using Github, Bitbucket and Gitlab using OpenID Connect (OAUTH 2.0) protocol.
10+
For additional login integrations based on OAUTH 2.0, like using google identities, you'll need to provide Codefresh your client ID and client secret.
11+
12+

‎_docs/sso/sso-setup-saml2.md‎

Lines changed: 65 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,65 @@
1+
---
2+
title:"Setting Up SAML2 Federated Single Sign-On (SSO)"
3+
description:""
4+
group:sso
5+
permalink:/:collection/sso/sso-setup-saml2/
6+
toc:true
7+
---
8+
9+
As IdPs come in all shapes and sizes, the following topic discusses in general what you must do to configure Federated SSO.
10+
As you will see in the description below, the person in your organization responsible for managing your IdP will need to interact with Codefresh support team to successfully set up a trust between your IdP and Codefresh SP.
11+
12+
{:.text-secondary}
13+
##Before you set up Federated SSO:
14+
1. Have your account set up with Codefresh enterprise plan
15+
2. Ensure you have a working SAML 2.0 compliant Identity Provider (IdP).
16+
3. Identify someone in your organization who is familiar with configuring and managing your organization's IdP.
17+
4. Ensure that your IdP's system clock is synchronized with a reliable time source. If it is not, tokens generated will be unusable and SSO will fail.
18+
19+
{:.text-secondary}
20+
##Summary of Federated SSO Setup
21+
22+
{% include image.html
23+
lightbox="true"
24+
file="/images/sso-flow.png"
25+
url="/images/sso-flow.png"
26+
alt="sso-flow.png"
27+
max-width="100%"
28+
%}
29+
30+
{:.text-secondary}
31+
##SAML Attributes
32+
33+
Codefresh expects the following user attributes to be passed through SAML between your Idp and Codefresh SP:
34+
- User email address
35+
- User first name
36+
- User last name
37+
- User full name
38+
- User unique id that isn't subject to change in your identity managment environment
39+
40+
{:.text-secondary}
41+
##How does the connection process works?
42+
43+
{% include image.html
44+
lightbox="true"
45+
file="/images/sso-diagram.png"
46+
url="/images/sso-diagram.png"
47+
alt="sso-diagram.png"
48+
max-width="100%"
49+
%}
50+
51+
Once Federated SSO has been configured, the process works as follows:
52+
53+
<divclass="bd-callout bd-callout-info"markdown="1">
54+
Note
55+
56+
Steps 2 to 7 happen in the background, and are transparent to the user.
57+
</div>
58+
59+
1. A user logs in to Codefresh and enters their email
60+
2. The user is redirected to Codefresh Service Provider (SP) to initiate SSO.
61+
3. The user’s browser is then redirected to the customer IdP.
62+
4. Once authenticated by the corporate side, a SAML token is sent to the user’s browser.
63+
5. The SAML assertion is then forwarded to Codefresh SP.
64+
6. If you are a valid Codefresh user for this SSO connection, an SSO token is returned to the user’s browser.
65+
7. The user’s browser then returns a token to Codefresh and access is granted for your account.

‎images/sso-diagram.png‎

65.8 KB
Loading

‎images/sso-flow.png‎

99.2 KB
Loading

0 commit comments

Comments
 (0)

[8]ページ先頭

©2009-2025 Movatter.jp