You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/cloud/security/saml-sso-setup.md
+34-7Lines changed: 34 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -58,7 +58,7 @@ We recommend setting up a **direct link to your organization** in addition to yo
58
58
59
59
- Attribute mapping: `email = user.email`
60
60
61
-
- Direct link to access your organization: `https://console.clickhouse.cloud?connection={organizationid}`
61
+
- Direct link to access your organization: `https://console.clickhouse.cloud/?connection={organizationid}`
62
62
63
63
64
64
For specific configuration steps, refer to your specific identity provider below.
@@ -149,7 +149,7 @@ You will configure two App Integrations in Okta for each ClickHouse organization
149
149
150
150
5. Select a label for the app.
151
151
152
-
6. Enter the URL as `https://console.clickhouse.cloud?connection={organizationid}`
152
+
6. Enter the URL as `https://console.clickhouse.cloud/?connection={organizationid}`
153
153
154
154
7. Go to the **Assignments** tab and add the group you created above.
155
155
@@ -206,7 +206,7 @@ You will configure two App Integrations in Okta for each ClickHouse organization
206
206
207
207
### Configure Google SAML {#configure-google-saml}
208
208
209
-
You will configure one SAML app in Google for each organization and must provide your users the direct link (`https://console.clickhouse.cloud?connection={organizationId}`) to bookmark if using multi-org SSO.
209
+
You will configure one SAML app in Google for each organization and must provide your users the direct link (`https://console.clickhouse.cloud/?connection={organizationId}`) to bookmark if using multi-org SSO.
210
210
211
211
<details>
212
212
<summary> Create a Google Web App </summary>
@@ -290,7 +290,7 @@ Azure (Microsoft) SAML may also be referred to as Azure Active Directory (AD) or
| Entity ID |`urn:auth0:ch-production:{organizationid}`|
334
+
| Assertion Consumer Service (ACS) URL |`https://auth.clickhouse.cloud/login/callback?connection={organizationid}`|
335
+
| Service Provider Login URL |`https://console.clickhouse.cloud/?connection={organizationid}`|
336
+
337
+
4. Gather these two items and go to Submit a Support Case above to complete the process:
338
+
- Single Sign-On URL
339
+
- Certificate
340
+
341
+
</details>
342
+
316
343
317
344
## How It Works {#how-it-works}
318
345
@@ -322,19 +349,19 @@ We only utilize service provider initiated SSO. This means users go to `https://
322
349
323
350
### Assigning User Roles {#assigning-user-roles}
324
351
325
-
Users will appear in your ClickHouse Cloud console after they are assigned to your IdP application and log in for the first time. At least one SSO user should be assigned the Admin role in your organization. Use social login or `https://console.clickhouse.cloud?with=email` to log in with your original authentication method to update your SSO role.
352
+
Users will appear in your ClickHouse Cloud console after they are assigned to your IdP application and log in for the first time. At least one SSO user should be assigned the Admin role in your organization. Use social login or `https://console.clickhouse.cloud/?with=email` to log in with your original authentication method to update your SSO role.
Once you have SSO users set up and have assigned at least one user the Admin role, the Admin can remove users using other methods (e.g. social authentication or user ID + password). Google authentication will continue to work after SSO is set up. User ID + password users will be automatically redirected to SSO based on their email domain unless users use `https://console.clickhouse.cloud?with=email`.
356
+
Once you have SSO users set up and have assigned at least one user the Admin role, the Admin can remove users using other methods (e.g. social authentication or user ID + password). Google authentication will continue to work after SSO is set up. User ID + password users will be automatically redirected to SSO based on their email domain unless users use `https://console.clickhouse.cloud/?with=email`.
330
357
331
358
### Managing Users {#managing-users}
332
359
333
360
ClickHouse Cloud currently implements SAML for SSO. We have not yet implemented SCIM to manage users. This means SSO users must be assigned to the application in your IdP to access your ClickHouse Cloud organization. Users must log in to ClickHouse Cloud once to appear in the **Users** area in the organization. When users are removed in your IdP, they will not be able to log in to ClickHouse Cloud using SSO. However, the SSO user will still show in your organization until and administrator manually removes the user.
334
361
335
362
### Multi-Org SSO {#multi-org-sso}
336
363
337
-
ClickHouse Cloud supports multi-organization SSO by providing a separate connection for each organization. Use the direct link (`https://console.clickhouse.cloud?connection={organizationid}`) to log in to each respective organization. Be sure to log out of one organization before logging into another.
364
+
ClickHouse Cloud supports multi-organization SSO by providing a separate connection for each organization. Use the direct link (`https://console.clickhouse.cloud/?connection={organizationid}`) to log in to each respective organization. Be sure to log out of one organization before logging into another.
338
365
339
366
## Additional Information {#additional-information}
0 commit comments