You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Some Identity Providers, such as the Google and OIDC Identity Providers, request access tokens from a configured remote URL. Remote servers must respond within a certain time frame or the login workflow will fail.
1
+
Some Identity Providers, such as the Google and OIDC Identity Providers, request access tokens from a configured remote URL. Remote servers must respond within a certain time frame or the login workflow will fail. The limit is currently 10 seconds. It is not configurable.
2
2
3
-
The limit is currently 10 seconds. It is not configurable.
3
+
Managed domains can only be used with OIDC and SAMLv2 Identity Providers.
Copy file name to clipboardexpand all lines: astro/src/content/docs/lifecycle/authenticate-users/identity-providers/_managed-domains-description.mdx
+2
Original file line number
Diff line number
Diff line change
@@ -5,3 +5,5 @@ You may optionally scope this identity provider to one or more managed domains.
5
5
Adding one or more managed domains for this configuration will cause this provider not to be displayed as a button on your login page. Instead of a button the login form will first ask the user for their email address. If the user's email address matches one of the configured domains the user will then be redirected to this login provider to complete authentication. If the user's email address does not match one of the configured domains, the user will be prompted for a password and they will be authenticated using FusionAuth.
6
6
7
7
These configured domains will be used by the [Lookup API](/docs/apis/identity-providers/#lookup-an-identity-provider).
8
+
9
+
Learn more about [managed domains](/docs/lifecycle/authenticate-users/identity-providers/#managed-domains).
@@ -19,9 +20,9 @@ import IdentityProviderLimitations from 'src/content/docs/_shared/_identity-prov
19
20
20
21
Identity Providers allow you to enable third-party login in FusionAuth. This includes social options such as Facebook and Google, and enterprise options such as OIDC and SAML.
21
22
22
-
Find the FusionAuth Identity Providers in the UI by navigating to <strong>Settings -> Identity Providers</strong> or use the [Identity Providers](/docs/apis/identity-providers/) APIs.
23
+
Find the FusionAuth Identity Providers in the UI by navigating to <Breadcrumb>Settings -> Identity Providers</Breadcrumb> or use the [Identity Providers](/docs/apis/identity-providers/) APIs.
@@ -59,15 +60,15 @@ Identity providers can be configured to set a limit on the number of links that
59
60
60
61
In the following, we have enabled "Limit links per user" on the Default tenant and set a "Maximum link count" of `2`. With this configuration, a user will only be able to establish at most two links for this IdP specifically.
Identity providers can be enabled or disabled on a per application basis.
67
68
68
69
In the following screenshot you will see that we have enabled this login provider for the Pied Piper application and enabled "Create registration". Enabling "Create registration" means that a user does not need to be manually registered for the application prior to using this login provider.
For example, when a new user attempts to log into Pied Piper using Google, if their user does not exist in FusionAuth it will be created dynamically, and if the Create registration toggle has been enabled, the user will also be registered for Pied Piper and assigned any default roles assigned by the application.
73
74
@@ -85,7 +86,7 @@ You can have different identity provider configurations for different applicatio
85
86
86
87
You can override none, some or all of the available configuration values by expanding the <InlineUIElement>Overrides</InlineUIElement> element for the application's identity provider setting. You may also modify the <InlineField>identityProvider.applicationConfiguration</InlineField> values using the API.
For certain Identity Providers, there are no override settings since you can create more than one. You can have multiple configurations for these Identity Provider types:
91
92
@@ -113,6 +114,20 @@ An email address or domain may be provided in the `login_hint` request parameter
113
114
114
115
You can read more about the `login_hint` and `idp_hint` parameters in the [OAuth Endpoints documentation](/docs/lifecycle/authenticate-users/oauth/endpoints).
115
116
117
+
## Managed Domains
118
+
119
+
For SAML v2 or OIDC identity providers, you can optionally enable managed domains. This feature is not available for any other types of identity providers.
120
+
121
+
If users share a common email domain, such as `@example.com`, you can use managed domains to streamline their login process. Here's how it works:
122
+
123
+
- On the login page, users are prompted to enter their email address.
124
+
- If the email domain matches a managed domain defined in the identity provider settings, the user is automatically redirected to the configured identity provider for authentication.
125
+
- If the email domain does not match, the user proceeds to the standard email/password login flow.
126
+
127
+
Multiple email address domains can be managed by the same identity provider. Multiple identity providers can be configured with managed domains. Each email domain can be managed by at most one identity provider in a FusionAuth instance.
128
+
129
+
Configuring managed domains on an identity provider and then configuring the identity provider to be enabled for an application changes the login page experience for all users logging into this application. Every user viewing the application login page will be required to enter their email address first.
130
+
116
131
## Account Security
117
132
118
133
When you configure an Identity Provider, you are explicitly trusting this federated identity system to authenticate users. MFA requirements and configuration, roles and groups, email or phone verification, and account identifiers are controlled by the provider.
@@ -132,7 +147,7 @@ Such attacks can be mitigated by:
<imgsrc="/img/docs/lifecycle/authenticate-users/identity-providers/idp-linking-pending-link.png"alt="Screen prompting a user to connect their pending link account."width="1200"role="bottom-cropped" />
207
+

193
208
194
209
### Anonymous Link
195
210
@@ -205,7 +220,7 @@ Richard is logging into Pied Piper. He doesn't have an account in FusionAuth.
205
220
* There is an account created in FusionAuth with no username or email address. It is not a full account.
206
221
* Richard can interact with Pied Piper (a JWT is issued, etc), but cannot use FusionAuth workflows like 'forgot password'.
207
222
208
-
<imgsrc="/img/docs/lifecycle/authenticate-users/identity-providers/idp-linking-anonymous-account.png"alt="Admin view of a user who has linked anonymously."width="1200"role="bottom-cropped" />
223
+

209
224
210
225
#### Anonymous Link, No Email Or Username Returned By The IdP
211
226
@@ -256,7 +271,7 @@ Richard is logging into Pied Piper. He doesn't have an account in FusionAuth.
256
271
257
272
Here's an example of the error page:
258
273
259
-
<imgsrc="/img/docs/lifecycle/authenticate-users/identity-providers/idp-linking-user-must-exist.png"alt="Error when a user must exist for successful linking."width="1200"role="bottom-cropped" />
274
+

260
275
261
276
#### Link On Email, User Account Is Created If Needed
0 commit comments