You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
title: SAML identity providers and verified domains
2
+
title: Identity providers and SAML authentication
3
3
sidebar_label: Identity providers
4
4
---
5
5
6
6
Set up single sign-on (SSO) access to Aiven through a Security Assertion Markup Language (SAML) compliant identity provider (IdP). This lets you centrally manage your users in your IdP while giving them a seamless login experience.
7
7
8
-
Every IdP must be linked to a domain in Aiven. After you
8
+
Every IdP must be linked to a domain in Aiven and you can link each verified domain to
9
+
only one IdP. After you
9
10
[verify that you own a domain](/docs/platform/howto/manage-domains), the users in your
10
11
organization become managed users, which provides a higher level of security for your
11
12
organization by controlling things like
@@ -15,48 +16,13 @@ With a verified domain you can add an IdP. All users with an email address from
15
16
the verified domain are automatically authenticated with the linked IdP. With
16
17
IdP-initiated SSO enabled, users can log in to Aiven directly from the IdP.
17
18
18
-
Aiven also supports System for Cross-domain Identity Management (SCIM) for Okta to automatically
19
-
provision, update, and deactivate user identities from your IdP.
19
+
Aiven also supports System for Cross-domain Identity Management (SCIM) for Okta to
20
+
automatically provision, update, and deactivate user identities from your IdP.
20
21
With automatic provisioning you don’t need to manually create organization users.
21
-
22
22
When adding an IdP you link it to the verified domain
23
-
and can set up SCIM at the same time.
24
-
25
-
## Limitations
26
-
27
-
You can link each verified domain to only one IdP. If you set up user provisioning with
23
+
and can set up SCIM at the same time. If you set up user provisioning with
28
24
SCIM, you should only make changes to user details in the IdP.
29
25
30
-
## Security best practices
31
-
32
-
It’s recommended to verify your domains in Aiven even if you don’t use SSO. When
33
-
configuring an IdP it's best to enable the following SAML security settings:
34
-
35
-
-**Require assertion to be signed**: Verifies assertions were issued by a trusted party
36
-
and have not been tampered with.
37
-
-**Sign authorization request sent to IdP**: Ensures authenticity and integrity with a
38
-
digital signature.
39
-
40
-
The [authentication policy](/docs/platform/howto/set-authentication-policies) for the
41
-
organization is also an important component in securing access through an IdP. At a
42
-
minimum, use these settings for your authentication policy:
43
-
44
-
- Don't allow password authentication
45
-
- Require log in with this organization's identity provider
46
-
47
-
To limit access further, also consider these authentication policy settings:
48
-
49
-
-**Don't allow third-party authentication**: This combined with the preceding password and
50
-
organization identity provider settings ensures that users only log in to the Console
51
-
with your chosen IdP.
52
-
-**Don't allow users to create personal tokens**: This prevents users from accessing
53
-
organization resources through the API using a long-lived
54
-
[personal token](/docs/platform/concepts/authentication-tokens) they created.
55
-
56
-
If you allow your users to create personal tokens, you can still make these more
57
-
secure by enabling **Require users to be logged in with an allowed
58
-
authentication method**. This means that users cannot access your organization's
59
-
resources with a token they created when logged in with another organization's
60
-
allowed authentication methods or a previously allowed method.
61
-
This setting also gives you the flexibility to change the authentication policy at any
62
-
time because tokens that are no longer compliant with the new policy cannot be used.
26
+
See the [security checklist](/docs/platform/reference/security-best-practices#add-an-identity-provider)
27
+
for best practices for configuring your identity providers and
Copy file name to clipboardExpand all lines: docs/platform/howto/unsafe-passwords.md
+6Lines changed: 6 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -2,6 +2,8 @@
2
2
title: Change unsafe passwords
3
3
---
4
4
5
+
import RelatedPages from "@site/src/components/RelatedPages";
6
+
5
7
The Aiven Platform checks your email and password combination against a database of exposed credentials every time you log in and change your password.
6
8
7
9
If Aiven detects an unsafe password, your login is blocked until you
@@ -12,3 +14,7 @@ You don't need to do anything else, but Aiven recommends every user
0 commit comments