Show More
@@ -1,159 +1,161 b'' | |||||
1 | .. _config-saml-azure-ref: |
|
1 | .. _config-saml-azure-ref: | |
2 |
|
2 | |||
3 |
|
3 | |||
4 | SAML 2.0 with Azure Entra ID |
|
4 | SAML 2.0 with Azure Entra ID | |
5 | ---------------------------- |
|
5 | ---------------------------- | |
6 |
|
6 | |||
7 | **This plugin is available only in EE Edition.** |
|
7 | **This plugin is available only in EE Edition.** | |
8 |
|
8 | |||
9 | |RCE| supports SAML 2.0 Authentication with Azure Entra ID provider. This allows |
|
9 | |RCE| supports SAML 2.0 Authentication with Azure Entra ID provider. This allows | |
10 | users to log-in to RhodeCode via SSO mechanism of external identity provider |
|
10 | users to log-in to RhodeCode via SSO mechanism of external identity provider | |
11 | such as Azure AD. The login can be triggered either by the external IDP, or internally |
|
11 | such as Azure AD. The login can be triggered either by the external IDP, or internally | |
12 | by clicking specific authentication button on the log-in page. |
|
12 | by clicking specific authentication button on the log-in page. | |
13 |
|
13 | |||
14 |
|
14 | |||
15 | Configuration steps |
|
15 | Configuration steps | |
16 | ^^^^^^^^^^^^^^^^^^^ |
|
16 | ^^^^^^^^^^^^^^^^^^^ | |
17 |
|
17 | |||
18 | To configure Duo Security SAML authentication, use the following steps: |
|
18 | To configure Duo Security SAML authentication, use the following steps: | |
19 |
|
19 | |||
20 | 1. From the |RCE| interface, select |
|
20 | 1. From the |RCE| interface, select | |
21 | :menuselection:`Admin --> Authentication` |
|
21 | :menuselection:`Admin --> Authentication` | |
22 | 2. Activate the `Azure Entra ID` plugin and select :guilabel:`Save` |
|
22 | 2. Activate the `Azure Entra ID` plugin and select :guilabel:`Save` | |
23 | 3. Go to newly available menu option called `Azure Entra ID` on the left side. |
|
23 | 3. Go to newly available menu option called `Azure Entra ID` on the left side. | |
24 | 4. Check the `enabled` check box in the plugin configuration section, |
|
24 | 4. Check the `enabled` check box in the plugin configuration section, | |
25 | and fill in the required SAML information and :guilabel:`Save`, for more details, |
|
25 | and fill in the required SAML information and :guilabel:`Save`, for more details, | |
26 | see :ref:`config-saml-azure` |
|
26 | see :ref:`config-saml-azure` | |
27 |
|
27 | |||
28 |
|
28 | |||
29 | .. _config-saml-azure: |
|
29 | .. _config-saml-azure: | |
30 |
|
30 | |||
31 |
|
31 | |||
32 | Example SAML Azure Entra ID configuration |
|
32 | Example SAML Azure Entra ID configuration | |
33 | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ |
|
33 | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ | |
34 |
|
34 | |||
35 | Example configuration for SAML 2.0 with Azure Entra ID provider |
|
35 | Example configuration for SAML 2.0 with Azure Entra ID provider | |
36 |
|
36 | |||
37 |
|
37 | |||
38 | Enabled |
|
38 | Enabled | |
39 | `True`: |
|
39 | `True`: | |
40 |
|
40 | |||
41 | .. note:: |
|
41 | .. note:: | |
42 | Enable or disable this authentication plugin. |
|
42 | Enable or disable this authentication plugin. | |
43 |
|
43 | |||
44 |
|
44 | |||
45 | Auth Cache TTL |
|
45 | Auth Cache TTL | |
46 | `30`: |
|
46 | `30`: | |
47 |
|
47 | |||
48 | .. note:: |
|
48 | .. note:: | |
49 | Amount of seconds to cache the authentication and permissions check response call for this plugin. |
|
49 | Amount of seconds to cache the authentication and permissions check response call for this plugin. | |
50 | Useful for expensive calls like LDAP to improve the performance of the system (0 means disabled). |
|
50 | Useful for expensive calls like LDAP to improve the performance of the system (0 means disabled). | |
51 |
|
51 | |||
52 | Debug |
|
52 | Debug | |
53 | `True`: |
|
53 | `True`: | |
54 |
|
54 | |||
55 | .. note:: |
|
55 | .. note:: | |
56 | Enable or disable debug mode that shows SAML errors in the RhodeCode logs. |
|
56 | Enable or disable debug mode that shows SAML errors in the RhodeCode logs. | |
57 |
|
57 | |||
58 |
|
58 | |||
59 | Auth button name |
|
59 | Auth button name | |
60 | `Azure Entra ID`: |
|
60 | `Azure Entra ID`: | |
61 |
|
61 | |||
62 | .. note:: |
|
62 | .. note:: | |
63 | Alternative authentication display name. E.g AzureAuth, CorporateID etc. |
|
63 | Alternative authentication display name. E.g AzureAuth, CorporateID etc. | |
64 |
|
64 | |||
65 |
|
65 | |||
66 | Entity ID |
|
66 | Entity ID | |
67 | `https://sts.windows.net/APP_ID/`: |
|
67 | `https://sts.windows.net/APP_ID/`: | |
68 |
|
68 | |||
69 | .. note:: |
|
69 | .. note:: | |
70 | Identity Provider entity/metadata URI. Known as "Microsoft Entra Identifier" |
|
70 | Identity Provider entity/metadata URI. Known as "Microsoft Entra Identifier" | |
71 | E.g. https://sts.windows.net/abcd-c655-dcee-aab7-abcd/ |
|
71 | E.g. https://sts.windows.net/abcd-c655-dcee-aab7-abcd/ | |
72 |
|
72 | |||
73 | SSO URL |
|
73 | SSO URL | |
74 | `https://login.microsoftonline.com/APP_ID/saml2`: |
|
74 | `https://login.microsoftonline.com/APP_ID/saml2`: | |
75 |
|
75 | |||
76 | .. note:: |
|
76 | .. note:: | |
77 | SSO (SingleSignOn) endpoint URL of the IdP. This can be used to initialize login, Known also as Login URL |
|
77 | SSO (SingleSignOn) endpoint URL of the IdP. This can be used to initialize login, Known also as Login URL | |
78 | E.g. https://login.microsoftonline.com/abcd-c655-dcee-aab7-abcd/saml2 |
|
78 | E.g. https://login.microsoftonline.com/abcd-c655-dcee-aab7-abcd/saml2 | |
79 |
|
79 | |||
80 | SLO URL |
|
80 | SLO URL | |
81 | `https://login.microsoftonline.com/APP_ID/saml2`: |
|
81 | `https://login.microsoftonline.com/APP_ID/saml2`: | |
82 |
|
82 | |||
83 | .. note:: |
|
83 | .. note:: | |
84 | SLO (SingleLogout) endpoint URL of the IdP. , Known also as Logout URL |
|
84 | SLO (SingleLogout) endpoint URL of the IdP. , Known also as Logout URL | |
85 | E.g. https://login.microsoftonline.com/abcd-c655-dcee-aab7-abcd/saml2 |
|
85 | E.g. https://login.microsoftonline.com/abcd-c655-dcee-aab7-abcd/saml2 | |
86 |
|
86 | |||
87 | x509cert |
|
87 | x509cert | |
88 | `<CERTIFICATE_STRING>`: |
|
88 | `<CERTIFICATE_STRING>`: | |
89 |
|
89 | |||
90 | .. note:: |
|
90 | .. note:: | |
91 | Identity provider public x509 certificate. It will be converted to single-line format without headers. |
|
91 | Identity provider public x509 certificate. It will be converted to single-line format without headers. | |
92 | Download the raw base64 encoded certificate from the Identity provider and paste it here. |
|
92 | Download the raw base64 encoded certificate from the Identity provider and paste it here. | |
93 |
|
93 | |||
94 | SAML Signature |
|
94 | SAML Signature | |
95 | `sha-256`: |
|
95 | `sha-256`: | |
96 |
|
96 | |||
97 | .. note:: |
|
97 | .. note:: | |
98 | Type of Algorithm to use for verification of SAML signature on Identity provider side. |
|
98 | Type of Algorithm to use for verification of SAML signature on Identity provider side. | |
99 |
|
99 | |||
100 | SAML Digest |
|
100 | SAML Digest | |
101 | `sha-256`: |
|
101 | `sha-256`: | |
102 |
|
102 | |||
103 | .. note:: |
|
103 | .. note:: | |
104 | Type of Algorithm to use for verification of SAML digest on Identity provider side. |
|
104 | Type of Algorithm to use for verification of SAML digest on Identity provider side. | |
105 |
|
105 | |||
106 | Service Provider Cert Dir |
|
106 | Service Provider Cert Dir | |
107 | `/etc/rhodecode/conf/saml_ssl/`: |
|
107 | `/etc/rhodecode/conf/saml_ssl/`: | |
108 |
|
108 | |||
109 | .. note:: |
|
109 | .. note:: | |
110 | Optional directory to store service provider certificate and private keys. |
|
110 | Optional directory to store service provider certificate and private keys. | |
111 | Expected certs for the SP should be stored in this folder as: |
|
111 | Expected certs for the SP should be stored in this folder as: | |
112 | * sp.key Private Key |
|
112 | ||
113 |
|
|
113 | * sp.key Private Key | |
114 |
|
|
114 | * sp.crt Public cert | |
|
115 | * sp_new.crt Future Public cert | |||
115 |
|
116 | |||
116 | Also you can use other cert to sign the metadata of the SP using the: |
|
117 | Also you can use other cert to sign the metadata of the SP using the: | |
117 | * metadata.key |
|
118 | ||
118 |
|
|
119 | * metadata.key | |
|
120 | * metadata.crt | |||
119 |
|
121 | |||
120 | Expected NameID Format |
|
122 | Expected NameID Format | |
121 | `nameid-format:emailAddress`: |
|
123 | `nameid-format:emailAddress`: | |
122 |
|
124 | |||
123 | .. note:: |
|
125 | .. note:: | |
124 | The format that specifies how the NameID is sent to the service provider. |
|
126 | The format that specifies how the NameID is sent to the service provider. | |
125 |
|
127 | |||
126 | User ID Attribute |
|
128 | User ID Attribute | |
127 | `user.email`: |
|
129 | `user.email`: | |
128 |
|
130 | |||
129 | .. note:: |
|
131 | .. note:: | |
130 | User ID Attribute name. This defines which attribute in SAML response will be used to link accounts via unique id. |
|
132 | User ID Attribute name. This defines which attribute in SAML response will be used to link accounts via unique id. | |
131 | Ensure this is returned from DuoSecurity for example via duo_username. |
|
133 | Ensure this is returned from DuoSecurity for example via duo_username. | |
132 |
|
134 | |||
133 | Username Attribute |
|
135 | Username Attribute | |
134 | `user.username`: |
|
136 | `user.username`: | |
135 |
|
137 | |||
136 | .. note:: |
|
138 | .. note:: | |
137 | Username Attribute name. This defines which attribute in SAML response will map to a username. |
|
139 | Username Attribute name. This defines which attribute in SAML response will map to a username. | |
138 |
|
140 | |||
139 | Email Attribute |
|
141 | Email Attribute | |
140 | `user.email`: |
|
142 | `user.email`: | |
141 |
|
143 | |||
142 | .. note:: |
|
144 | .. note:: | |
143 | Email Attribute name. This defines which attribute in SAML response will map to an email address. |
|
145 | Email Attribute name. This defines which attribute in SAML response will map to an email address. | |
144 |
|
146 | |||
145 |
|
147 | |||
146 |
|
148 | |||
147 | Below is example setup from Azure Administration page that can be used with above config. |
|
149 | Below is example setup from Azure Administration page that can be used with above config. | |
148 |
|
150 | |||
149 | .. image:: ../images/saml-azure-service-provider-example.png |
|
151 | .. image:: ../images/saml-azure-service-provider-example.png | |
150 | :alt: Azure SAML setup example |
|
152 | :alt: Azure SAML setup example | |
151 | :scale: 50 % |
|
153 | :scale: 50 % | |
152 |
|
154 | |||
153 |
|
155 | |||
154 | Below is an example attribute mapping set for IDP provider required by the above config. |
|
156 | Below is an example attribute mapping set for IDP provider required by the above config. | |
155 |
|
157 | |||
156 |
|
158 | |||
157 | .. image:: ../images/saml-azure-attributes-example.png |
|
159 | .. image:: ../images/saml-azure-attributes-example.png | |
158 | :alt: Azure SAML setup example |
|
160 | :alt: Azure SAML setup example | |
159 | :scale: 50 % No newline at end of file |
|
161 | :scale: 50 % |
@@ -1,159 +1,161 b'' | |||||
1 | .. _config-saml-duosecurity-ref: |
|
1 | .. _config-saml-duosecurity-ref: | |
2 |
|
2 | |||
3 |
|
3 | |||
4 | SAML 2.0 with Duo Security |
|
4 | SAML 2.0 with Duo Security | |
5 | -------------------------- |
|
5 | -------------------------- | |
6 |
|
6 | |||
7 | **This plugin is available only in EE Edition.** |
|
7 | **This plugin is available only in EE Edition.** | |
8 |
|
8 | |||
9 | |RCE| supports SAML 2.0 Authentication with Duo Security provider. This allows |
|
9 | |RCE| supports SAML 2.0 Authentication with Duo Security provider. This allows | |
10 | users to log-in to RhodeCode via SSO mechanism of external identity provider |
|
10 | users to log-in to RhodeCode via SSO mechanism of external identity provider | |
11 | such as Duo. The login can be triggered either by the external IDP, or internally |
|
11 | such as Duo. The login can be triggered either by the external IDP, or internally | |
12 | by clicking specific authentication button on the log-in page. |
|
12 | by clicking specific authentication button on the log-in page. | |
13 |
|
13 | |||
14 |
|
14 | |||
15 | Configuration steps |
|
15 | Configuration steps | |
16 | ^^^^^^^^^^^^^^^^^^^ |
|
16 | ^^^^^^^^^^^^^^^^^^^ | |
17 |
|
17 | |||
18 | To configure Duo Security SAML authentication, use the following steps: |
|
18 | To configure Duo Security SAML authentication, use the following steps: | |
19 |
|
19 | |||
20 | 1. From the |RCE| interface, select |
|
20 | 1. From the |RCE| interface, select | |
21 | :menuselection:`Admin --> Authentication` |
|
21 | :menuselection:`Admin --> Authentication` | |
22 | 2. Activate the `Duo Security` plugin and select :guilabel:`Save` |
|
22 | 2. Activate the `Duo Security` plugin and select :guilabel:`Save` | |
23 | 3. Go to newly available menu option called `Duo Security` on the left side. |
|
23 | 3. Go to newly available menu option called `Duo Security` on the left side. | |
24 | 4. Check the `enabled` check box in the plugin configuration section, |
|
24 | 4. Check the `enabled` check box in the plugin configuration section, | |
25 | and fill in the required SAML information and :guilabel:`Save`, for more details, |
|
25 | and fill in the required SAML information and :guilabel:`Save`, for more details, | |
26 | see :ref:`config-saml-duosecurity` |
|
26 | see :ref:`config-saml-duosecurity` | |
27 |
|
27 | |||
28 |
|
28 | |||
29 | .. _config-saml-duosecurity: |
|
29 | .. _config-saml-duosecurity: | |
30 |
|
30 | |||
31 |
|
31 | |||
32 | Example SAML Duo Security configuration |
|
32 | Example SAML Duo Security configuration | |
33 | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ |
|
33 | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ | |
34 |
|
34 | |||
35 | Example configuration for SAML 2.0 with Duo Security provider |
|
35 | Example configuration for SAML 2.0 with Duo Security provider | |
36 |
|
36 | |||
37 |
|
37 | |||
38 | Enabled |
|
38 | Enabled | |
39 | `True`: |
|
39 | `True`: | |
40 |
|
40 | |||
41 | .. note:: |
|
41 | .. note:: | |
42 | Enable or disable this authentication plugin. |
|
42 | Enable or disable this authentication plugin. | |
43 |
|
43 | |||
44 |
|
44 | |||
45 | Auth Cache TTL |
|
45 | Auth Cache TTL | |
46 | `30`: |
|
46 | `30`: | |
47 |
|
47 | |||
48 | .. note:: |
|
48 | .. note:: | |
49 | Amount of seconds to cache the authentication and permissions check response call for this plugin. |
|
49 | Amount of seconds to cache the authentication and permissions check response call for this plugin. | |
50 | Useful for expensive calls like LDAP to improve the performance of the system (0 means disabled). |
|
50 | Useful for expensive calls like LDAP to improve the performance of the system (0 means disabled). | |
51 |
|
51 | |||
52 | Debug |
|
52 | Debug | |
53 | `True`: |
|
53 | `True`: | |
54 |
|
54 | |||
55 | .. note:: |
|
55 | .. note:: | |
56 | Enable or disable debug mode that shows SAML errors in the RhodeCode logs. |
|
56 | Enable or disable debug mode that shows SAML errors in the RhodeCode logs. | |
57 |
|
57 | |||
58 |
|
58 | |||
59 | Auth button name |
|
59 | Auth button name | |
60 | `Azure Entra ID`: |
|
60 | `Azure Entra ID`: | |
61 |
|
61 | |||
62 | .. note:: |
|
62 | .. note:: | |
63 | Alternative authentication display name. E.g AzureAuth, CorporateID etc. |
|
63 | Alternative authentication display name. E.g AzureAuth, CorporateID etc. | |
64 |
|
64 | |||
65 |
|
65 | |||
66 | Entity ID |
|
66 | Entity ID | |
67 | `https://my-duo-gateway.com/dag/saml2/idp/metadata.php`: |
|
67 | `https://my-duo-gateway.com/dag/saml2/idp/metadata.php`: | |
68 |
|
68 | |||
69 | .. note:: |
|
69 | .. note:: | |
70 | Identity Provider entity/metadata URI. |
|
70 | Identity Provider entity/metadata URI. | |
71 | E.g. https://duo-gateway.com/dag/saml2/idp/metadata.php |
|
71 | E.g. https://duo-gateway.com/dag/saml2/idp/metadata.php | |
72 |
|
72 | |||
73 | SSO URL |
|
73 | SSO URL | |
74 | `https://duo-gateway.com/dag/saml2/idp/SSOService.php?spentityid=<metadata_entity_id>`: |
|
74 | `https://duo-gateway.com/dag/saml2/idp/SSOService.php?spentityid=<metadata_entity_id>`: | |
75 |
|
75 | |||
76 | .. note:: |
|
76 | .. note:: | |
77 | SSO (SingleSignOn) endpoint URL of the IdP. This can be used to initialize login, Known also as Login URL |
|
77 | SSO (SingleSignOn) endpoint URL of the IdP. This can be used to initialize login, Known also as Login URL | |
78 | E.g. http://rc-app.com/dag/saml2/idp/SSOService.php?spentityid=https://docker-dev/_admin/auth/duosecurity/saml-metadata |
|
78 | E.g. http://rc-app.com/dag/saml2/idp/SSOService.php?spentityid=https://docker-dev/_admin/auth/duosecurity/saml-metadata | |
79 |
|
79 | |||
80 | SLO URL |
|
80 | SLO URL | |
81 | `https://duo-gateway.com/dag/saml2/idp/SingleLogoutService.php?ReturnTo=<return_url>`: |
|
81 | `https://duo-gateway.com/dag/saml2/idp/SingleLogoutService.php?ReturnTo=<return_url>`: | |
82 |
|
82 | |||
83 | .. note:: |
|
83 | .. note:: | |
84 | SLO (SingleLogout) endpoint URL of the IdP. , Known also as Logout URL |
|
84 | SLO (SingleLogout) endpoint URL of the IdP. , Known also as Logout URL | |
85 | E.g. http://rc-app.com/dag/saml2/idp/SingleLogoutService.php?ReturnTo=https://docker-dev/_admin/auth/duosecurity/saml-sign-out-endpoint |
|
85 | E.g. http://rc-app.com/dag/saml2/idp/SingleLogoutService.php?ReturnTo=https://docker-dev/_admin/auth/duosecurity/saml-sign-out-endpoint | |
86 |
|
86 | |||
87 | x509cert |
|
87 | x509cert | |
88 | `<CERTIFICATE_STRING>`: |
|
88 | `<CERTIFICATE_STRING>`: | |
89 |
|
89 | |||
90 | .. note:: |
|
90 | .. note:: | |
91 | Identity provider public x509 certificate. It will be converted to single-line format without headers. |
|
91 | Identity provider public x509 certificate. It will be converted to single-line format without headers. | |
92 | Download the raw base64 encoded certificate from the Identity provider and paste it here. |
|
92 | Download the raw base64 encoded certificate from the Identity provider and paste it here. | |
93 |
|
93 | |||
94 | SAML Signature |
|
94 | SAML Signature | |
95 | `sha-256`: |
|
95 | `sha-256`: | |
96 |
|
96 | |||
97 | .. note:: |
|
97 | .. note:: | |
98 | Type of Algorithm to use for verification of SAML signature on Identity provider side. |
|
98 | Type of Algorithm to use for verification of SAML signature on Identity provider side. | |
99 |
|
99 | |||
100 | SAML Digest |
|
100 | SAML Digest | |
101 | `sha-256`: |
|
101 | `sha-256`: | |
102 |
|
102 | |||
103 | .. note:: |
|
103 | .. note:: | |
104 | Type of Algorithm to use for verification of SAML digest on Identity provider side. |
|
104 | Type of Algorithm to use for verification of SAML digest on Identity provider side. | |
105 |
|
105 | |||
106 | Service Provider Cert Dir |
|
106 | Service Provider Cert Dir | |
107 | `/etc/rhodecode/conf/saml_ssl/`: |
|
107 | `/etc/rhodecode/conf/saml_ssl/`: | |
108 |
|
108 | |||
109 | .. note:: |
|
109 | .. note:: | |
110 | Optional directory to store service provider certificate and private keys. |
|
110 | Optional directory to store service provider certificate and private keys. | |
111 | Expected certs for the SP should be stored in this folder as: |
|
111 | Expected certs for the SP should be stored in this folder as: | |
112 | * sp.key Private Key |
|
112 | ||
113 |
|
|
113 | * sp.key Private Key | |
114 |
|
|
114 | * sp.crt Public cert | |
|
115 | * sp_new.crt Future Public cert | |||
115 |
|
116 | |||
116 | Also you can use other cert to sign the metadata of the SP using the: |
|
117 | Also you can use other cert to sign the metadata of the SP using the: | |
117 | * metadata.key |
|
118 | ||
118 |
|
|
119 | * metadata.key | |
|
120 | * metadata.crt | |||
119 |
|
121 | |||
120 | Expected NameID Format |
|
122 | Expected NameID Format | |
121 | `nameid-format:emailAddress`: |
|
123 | `nameid-format:emailAddress`: | |
122 |
|
124 | |||
123 | .. note:: |
|
125 | .. note:: | |
124 | The format that specifies how the NameID is sent to the service provider. |
|
126 | The format that specifies how the NameID is sent to the service provider. | |
125 |
|
127 | |||
126 | User ID Attribute |
|
128 | User ID Attribute | |
127 | `PersonImmutableID`: |
|
129 | `PersonImmutableID`: | |
128 |
|
130 | |||
129 | .. note:: |
|
131 | .. note:: | |
130 | User ID Attribute name. This defines which attribute in SAML response will be used to link accounts via unique id. |
|
132 | User ID Attribute name. This defines which attribute in SAML response will be used to link accounts via unique id. | |
131 | Ensure this is returned from DuoSecurity for example via duo_username. |
|
133 | Ensure this is returned from DuoSecurity for example via duo_username. | |
132 |
|
134 | |||
133 | Username Attribute |
|
135 | Username Attribute | |
134 | `User.username`: |
|
136 | `User.username`: | |
135 |
|
137 | |||
136 | .. note:: |
|
138 | .. note:: | |
137 | Username Attribute name. This defines which attribute in SAML response will map to a username. |
|
139 | Username Attribute name. This defines which attribute in SAML response will map to a username. | |
138 |
|
140 | |||
139 | Email Attribute |
|
141 | Email Attribute | |
140 | `User.email`: |
|
142 | `User.email`: | |
141 |
|
143 | |||
142 | .. note:: |
|
144 | .. note:: | |
143 | Email Attribute name. This defines which attribute in SAML response will map to an email address. |
|
145 | Email Attribute name. This defines which attribute in SAML response will map to an email address. | |
144 |
|
146 | |||
145 |
|
147 | |||
146 |
|
148 | |||
147 | Below is example setup from DUO Administration page that can be used with above config. |
|
149 | Below is example setup from DUO Administration page that can be used with above config. | |
148 |
|
150 | |||
149 | .. image:: ../images/saml-duosecurity-service-provider-example.png |
|
151 | .. image:: ../images/saml-duosecurity-service-provider-example.png | |
150 | :alt: DUO Security SAML setup example |
|
152 | :alt: DUO Security SAML setup example | |
151 | :scale: 50 % |
|
153 | :scale: 50 % | |
152 |
|
154 | |||
153 |
|
155 | |||
154 | Below is an example attribute mapping set for IDP provider required by the above config. |
|
156 | Below is an example attribute mapping set for IDP provider required by the above config. | |
155 |
|
157 | |||
156 |
|
158 | |||
157 | .. image:: ../images/saml-duosecurity-attributes-example.png |
|
159 | .. image:: ../images/saml-duosecurity-attributes-example.png | |
158 | :alt: DUO Security SAML setup example |
|
160 | :alt: DUO Security SAML setup example | |
159 | :scale: 50 % No newline at end of file |
|
161 | :scale: 50 % |
@@ -1,159 +1,161 b'' | |||||
1 | .. _config-saml-onelogin-ref: |
|
1 | .. _config-saml-onelogin-ref: | |
2 |
|
2 | |||
3 |
|
3 | |||
4 | SAML 2.0 with One Login |
|
4 | SAML 2.0 with One Login | |
5 | ----------------------- |
|
5 | ----------------------- | |
6 |
|
6 | |||
7 | **This plugin is available only in EE Edition.** |
|
7 | **This plugin is available only in EE Edition.** | |
8 |
|
8 | |||
9 | |RCE| supports SAML 2.0 Authentication with OneLogin provider. This allows |
|
9 | |RCE| supports SAML 2.0 Authentication with OneLogin provider. This allows | |
10 | users to log-in to RhodeCode via SSO mechanism of external identity provider |
|
10 | users to log-in to RhodeCode via SSO mechanism of external identity provider | |
11 | such as OneLogin. The login can be triggered either by the external IDP, or internally |
|
11 | such as OneLogin. The login can be triggered either by the external IDP, or internally | |
12 | by clicking specific authentication button on the log-in page. |
|
12 | by clicking specific authentication button on the log-in page. | |
13 |
|
13 | |||
14 |
|
14 | |||
15 | Configuration steps |
|
15 | Configuration steps | |
16 | ^^^^^^^^^^^^^^^^^^^ |
|
16 | ^^^^^^^^^^^^^^^^^^^ | |
17 |
|
17 | |||
18 | To configure OneLogin SAML authentication, use the following steps: |
|
18 | To configure OneLogin SAML authentication, use the following steps: | |
19 |
|
19 | |||
20 | 1. From the |RCE| interface, select |
|
20 | 1. From the |RCE| interface, select | |
21 | :menuselection:`Admin --> Authentication` |
|
21 | :menuselection:`Admin --> Authentication` | |
22 | 2. Activate the `OneLogin` plugin and select :guilabel:`Save` |
|
22 | 2. Activate the `OneLogin` plugin and select :guilabel:`Save` | |
23 | 3. Go to newly available menu option called `OneLogin` on the left side. |
|
23 | 3. Go to newly available menu option called `OneLogin` on the left side. | |
24 | 4. Check the `enabled` check box in the plugin configuration section, |
|
24 | 4. Check the `enabled` check box in the plugin configuration section, | |
25 | and fill in the required SAML information and :guilabel:`Save`, for more details, |
|
25 | and fill in the required SAML information and :guilabel:`Save`, for more details, | |
26 | see :ref:`config-saml-onelogin` |
|
26 | see :ref:`config-saml-onelogin` | |
27 |
|
27 | |||
28 |
|
28 | |||
29 | .. _config-saml-onelogin: |
|
29 | .. _config-saml-onelogin: | |
30 |
|
30 | |||
31 |
|
31 | |||
32 | Example SAML OneLogin configuration |
|
32 | Example SAML OneLogin configuration | |
33 | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ |
|
33 | ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ | |
34 |
|
34 | |||
35 | Example configuration for SAML 2.0 with OneLogin provider |
|
35 | Example configuration for SAML 2.0 with OneLogin provider | |
36 |
|
36 | |||
37 |
|
37 | |||
38 | Enabled |
|
38 | Enabled | |
39 | `True`: |
|
39 | `True`: | |
40 |
|
40 | |||
41 | .. note:: |
|
41 | .. note:: | |
42 | Enable or disable this authentication plugin. |
|
42 | Enable or disable this authentication plugin. | |
43 |
|
43 | |||
44 |
|
44 | |||
45 | Auth Cache TTL |
|
45 | Auth Cache TTL | |
46 | `30`: |
|
46 | `30`: | |
47 |
|
47 | |||
48 | .. note:: |
|
48 | .. note:: | |
49 | Amount of seconds to cache the authentication and permissions check response call for this plugin. |
|
49 | Amount of seconds to cache the authentication and permissions check response call for this plugin. | |
50 | Useful for expensive calls like LDAP to improve the performance of the system (0 means disabled). |
|
50 | Useful for expensive calls like LDAP to improve the performance of the system (0 means disabled). | |
51 |
|
51 | |||
52 | Debug |
|
52 | Debug | |
53 | `True`: |
|
53 | `True`: | |
54 |
|
54 | |||
55 | .. note:: |
|
55 | .. note:: | |
56 | Enable or disable debug mode that shows SAML errors in the RhodeCode logs. |
|
56 | Enable or disable debug mode that shows SAML errors in the RhodeCode logs. | |
57 |
|
57 | |||
58 |
|
58 | |||
59 | Auth button name |
|
59 | Auth button name | |
60 | `Azure Entra ID`: |
|
60 | `Azure Entra ID`: | |
61 |
|
61 | |||
62 | .. note:: |
|
62 | .. note:: | |
63 | Alternative authentication display name. E.g AzureAuth, CorporateID etc. |
|
63 | Alternative authentication display name. E.g AzureAuth, CorporateID etc. | |
64 |
|
64 | |||
65 |
|
65 | |||
66 | Entity ID |
|
66 | Entity ID | |
67 | `https://app.onelogin.com/saml/metadata/<onelogin_connector_id>`: |
|
67 | `https://app.onelogin.com/saml/metadata/<onelogin_connector_id>`: | |
68 |
|
68 | |||
69 | .. note:: |
|
69 | .. note:: | |
70 | Identity Provider entity/metadata URI. |
|
70 | Identity Provider entity/metadata URI. | |
71 | E.g. https://app.onelogin.com/saml/metadata/xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx |
|
71 | E.g. https://app.onelogin.com/saml/metadata/xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx | |
72 |
|
72 | |||
73 | SSO URL |
|
73 | SSO URL | |
74 | `https://app.onelogin.com/trust/saml2/http-post/sso/<onelogin_connector_id>`: |
|
74 | `https://app.onelogin.com/trust/saml2/http-post/sso/<onelogin_connector_id>`: | |
75 |
|
75 | |||
76 | .. note:: |
|
76 | .. note:: | |
77 | SSO (SingleSignOn) endpoint URL of the IdP. This can be used to initialize login, Known also as Login URL |
|
77 | SSO (SingleSignOn) endpoint URL of the IdP. This can be used to initialize login, Known also as Login URL | |
78 | E.g. https://app.onelogin.com/trust/saml2/http-post/sso/<onelogin_connector_id> |
|
78 | E.g. https://app.onelogin.com/trust/saml2/http-post/sso/<onelogin_connector_id> | |
79 |
|
79 | |||
80 | SLO URL |
|
80 | SLO URL | |
81 | `https://app.onelogin.com/trust/saml2/http-redirect/slo/<onelogin_connector_id>`: |
|
81 | `https://app.onelogin.com/trust/saml2/http-redirect/slo/<onelogin_connector_id>`: | |
82 |
|
82 | |||
83 | .. note:: |
|
83 | .. note:: | |
84 | SLO (SingleLogout) endpoint URL of the IdP. , Known also as Logout URL |
|
84 | SLO (SingleLogout) endpoint URL of the IdP. , Known also as Logout URL | |
85 | E.g. https://app.onelogin.com/trust/saml2/http-redirect/slo/<onelogin_connector_id> |
|
85 | E.g. https://app.onelogin.com/trust/saml2/http-redirect/slo/<onelogin_connector_id> | |
86 |
|
86 | |||
87 | x509cert |
|
87 | x509cert | |
88 | `<CERTIFICATE_STRING>`: |
|
88 | `<CERTIFICATE_STRING>`: | |
89 |
|
89 | |||
90 | .. note:: |
|
90 | .. note:: | |
91 | Identity provider public x509 certificate. It will be converted to single-line format without headers. |
|
91 | Identity provider public x509 certificate. It will be converted to single-line format without headers. | |
92 | Download the raw base64 encoded certificate from the Identity provider and paste it here. |
|
92 | Download the raw base64 encoded certificate from the Identity provider and paste it here. | |
93 |
|
93 | |||
94 | SAML Signature |
|
94 | SAML Signature | |
95 | `sha-256`: |
|
95 | `sha-256`: | |
96 |
|
96 | |||
97 | .. note:: |
|
97 | .. note:: | |
98 | Type of Algorithm to use for verification of SAML signature on Identity provider side. |
|
98 | Type of Algorithm to use for verification of SAML signature on Identity provider side. | |
99 |
|
99 | |||
100 | SAML Digest |
|
100 | SAML Digest | |
101 | `sha-256`: |
|
101 | `sha-256`: | |
102 |
|
102 | |||
103 | .. note:: |
|
103 | .. note:: | |
104 | Type of Algorithm to use for verification of SAML digest on Identity provider side. |
|
104 | Type of Algorithm to use for verification of SAML digest on Identity provider side. | |
105 |
|
105 | |||
106 | Service Provider Cert Dir |
|
106 | Service Provider Cert Dir | |
107 | `/etc/rhodecode/conf/saml_ssl/`: |
|
107 | `/etc/rhodecode/conf/saml_ssl/`: | |
108 |
|
108 | |||
109 | .. note:: |
|
109 | .. note:: | |
110 | Optional directory to store service provider certificate and private keys. |
|
110 | Optional directory to store service provider certificate and private keys. | |
111 | Expected certs for the SP should be stored in this folder as: |
|
111 | Expected certs for the SP should be stored in this folder as: | |
112 | * sp.key Private Key |
|
112 | ||
113 |
|
|
113 | * sp.key Private Key | |
114 |
|
|
114 | * sp.crt Public cert | |
|
115 | * sp_new.crt Future Public cert | |||
115 |
|
116 | |||
116 | Also you can use other cert to sign the metadata of the SP using the: |
|
117 | Also you can use other cert to sign the metadata of the SP using the: | |
117 | * metadata.key |
|
118 | ||
118 |
|
|
119 | * metadata.key | |
|
120 | * metadata.crt | |||
119 |
|
121 | |||
120 | Expected NameID Format |
|
122 | Expected NameID Format | |
121 | `nameid-format:emailAddress`: |
|
123 | `nameid-format:emailAddress`: | |
122 |
|
124 | |||
123 | .. note:: |
|
125 | .. note:: | |
124 | The format that specifies how the NameID is sent to the service provider. |
|
126 | The format that specifies how the NameID is sent to the service provider. | |
125 |
|
127 | |||
126 | User ID Attribute |
|
128 | User ID Attribute | |
127 | `PersonImmutableID`: |
|
129 | `PersonImmutableID`: | |
128 |
|
130 | |||
129 | .. note:: |
|
131 | .. note:: | |
130 | User ID Attribute name. This defines which attribute in SAML response will be used to link accounts via unique id. |
|
132 | User ID Attribute name. This defines which attribute in SAML response will be used to link accounts via unique id. | |
131 | Ensure this is returned from DuoSecurity for example via duo_username. |
|
133 | Ensure this is returned from DuoSecurity for example via duo_username. | |
132 |
|
134 | |||
133 | Username Attribute |
|
135 | Username Attribute | |
134 | `User.username`: |
|
136 | `User.username`: | |
135 |
|
137 | |||
136 | .. note:: |
|
138 | .. note:: | |
137 | Username Attribute name. This defines which attribute in SAML response will map to a username. |
|
139 | Username Attribute name. This defines which attribute in SAML response will map to a username. | |
138 |
|
140 | |||
139 | Email Attribute |
|
141 | Email Attribute | |
140 | `User.email`: |
|
142 | `User.email`: | |
141 |
|
143 | |||
142 | .. note:: |
|
144 | .. note:: | |
143 | Email Attribute name. This defines which attribute in SAML response will map to an email address. |
|
145 | Email Attribute name. This defines which attribute in SAML response will map to an email address. | |
144 |
|
146 | |||
145 |
|
147 | |||
146 |
|
148 | |||
147 | Below is example setup that can be used with OneLogin SAML authentication that can be used with above config.. |
|
149 | Below is example setup that can be used with OneLogin SAML authentication that can be used with above config.. | |
148 |
|
150 | |||
149 | .. image:: ../images/saml-onelogin-config-example.png |
|
151 | .. image:: ../images/saml-onelogin-config-example.png | |
150 | :alt: OneLogin SAML setup example |
|
152 | :alt: OneLogin SAML setup example | |
151 | :scale: 50 % |
|
153 | :scale: 50 % | |
152 |
|
154 | |||
153 |
|
155 | |||
154 | Below is an example attribute mapping set for IDP provider required by the above config. |
|
156 | Below is an example attribute mapping set for IDP provider required by the above config. | |
155 |
|
157 | |||
156 |
|
158 | |||
157 | .. image:: ../images/saml-onelogin-attributes-example.png |
|
159 | .. image:: ../images/saml-onelogin-attributes-example.png | |
158 | :alt: OneLogin SAML setup example |
|
160 | :alt: OneLogin SAML setup example | |
159 | :scale: 50 % No newline at end of file |
|
161 | :scale: 50 % |
General Comments 0
You need to be logged in to leave comments.
Login now