Configuring your IdP in the HM console Innovation Release
- Hybrid Manager dual release strategy
- Documentation for the current Long-term support release
The IdP configuration workflow in the Hybrid Manager (HM) console automates the integration process. When you use this workflow, you don't need to manually modify the Helm chart or restart the workload. The workflow makes deployment consistent and reduces downtime.
Important
You must be a HM Organization Owner to configure an IdP in HM.
Configuring a SAML IdP
You can use any identity provider (IdP) that supports SAML 2.0, such as Okta, Microsoft Entra ID, Google Workspace, or Keycloak.
Important
When you begin adding a SAML identity provider in HM, the system generates unique ACS URL and Audience URI values. These values change each time you start a new configuration. You must complete both the IdP configuration and the HM configuration in a single session without navigating away from the page.
Before you begin
- Open your IdP admin console in a separate browser tab.
- In HM, start the SAML IdP configuration to obtain the ACS URL and Audience URI.
- Copy these values to your IdP configuration immediately.
- Complete the IdP setup and obtain the SSO URL and certificate.
- Return to the HM tab (keep it open) and complete the configuration.
Starting the SAML configuration in HM
In the HM console, select Settings > Identity Providers.
Select Add Identity Provider.
Select the SAML tab.
Copy the following values (you need these for your IdP):
- Assertion Consumer Service (ACS) URL
- Audience URI (SP Entity ID)
Note
Don't close or navigate away from this page until you complete the HM configuration.
Configuring your identity provider
In a separate browser tab, create a new SAML 2.0 application in your IdP with the following settings:
Enter a name for the SAML integration.
Enter the ACS URL from HM in the Single Sign-On URL field.
Enter the Audience URI from HM in the Audience URI (SP Entity ID) field.
Set the Name ID Format based on your requirements. See NameID formats for details.
Configure attribute mappings to include user information in the SAML assertion.
Where:
- Username is the user's unique identifier.
- Email is the user's email address.
Note
Attribute names vary by IdP. Refer to your IdP's documentation for configuring SAML attribute statements.
Save the integration.
Copy the Single Sign-On URL (also called SSO URL or Login URL) provided by your IdP.
Download the Signing Certificate provided by your IdP (as a
.pemor.cerfile).
Completing the SAML configuration in HM
Return to the HM browser tab and enter the following:
In the Name field, enter a unique name for this identity provider.
In Description, enter an optional description for this identity provider.
In Single Sign-On URL, enter the SSO URL from your IdP.
Under Signature Certificate File, upload the signing certificate from your IdP.
Under NameID Format, select the format that matches your IdP configuration.
Enter the values for Username Attribute and Email Attribute. Where:
- Username Attribute is the attribute name containing the username (for example,
name). - Email Attribute is the attribute name containing the email address (for example,
email).
- Username Attribute is the attribute name containing the username (for example,
(Optional) To enable role mapping, configure group attribute mapping: Where:
- Groups Attribute is the SAML attribute name containing the user's group memberships (for example,
groupsormemberOf). - Groups Delimiter is the delimiter used to separate multiple groups in the attribute value. Leave empty if groups are sent as separate attribute values.
Note
Configure your IdP to include group membership in the SAML assertion. The exact configuration varies by IdP. Refer to your IdP's documentation for configuring group attribute statements.
- Groups Attribute is the SAML attribute name containing the user's group memberships (for example,
Select Save.
NameID formats
Select the NameID format that matches your IdP configuration:
| Format | Description | Use case |
|---|---|---|
| Email Address | User's email address | Most common. Use when users are identified by email. |
| Persistent | A persistent, opaque identifier for the user | When the IdP assigns stable user identifiers that aren't email addresses |
| Transient | A temporary identifier valid only for the current session | When privacy is required and no persistent identifier can be shared |
| X.509 Subject Name | The subject name from an X.509 certificate | When using certificate-based authentication |
Tip
If you're unsure which format to use, start with Email Address as it's the most commonly used format.
Configuring an LDAP IdP
You can configure HM to authenticate users against an LDAP directory server, such as OpenLDAP, Microsoft Active Directory, or other LDAP-compatible directories.
Requirements
Before configuring LDAP in HM, gather the following information from your LDAP administrator:
- LDAP server hostname and port
- Bind DN and password for a service account with read access
- Base DN for user searches
- User attribute names (username, email, name)
Configuring an LDAP IdP in HM
In the HM console, select Settings > Identity Providers.
Select Add Identity Provider.
Select the LDAP tab.
In the Name field, enter a unique name for this identity provider.
In Description, enter an optional description.
Enter the LDAP server connection settings:
Where:
- Host is the LDAP server hostname. For example:
ldap.example.com. - Port is the LDAP server port. Use
389for LDAP or636for LDAPS. - Scheme is the connection protocol. Select
ldapfor unencrypted orldapsfor TLS-encrypted connections. - Use Custom Root CA enables uploading a custom CA certificate for LDAPS connections with self-signed certificates.
- Host is the LDAP server hostname. For example:
Enter the bind credentials: Where:
- Bind DN is the distinguished name of the service account used to search the directory. For example:
cn=admin,dc=example,dc=com. - Bind Password is the password for the bind DN service account.
- Bind DN is the distinguished name of the service account used to search the directory. For example:
Enter the user search settings: Where:
- Base DN is the base distinguished name for user searches. For example:
ou=People,dc=example,dc=com. - Filter is the LDAP filter for finding user entries. For example:
(objectClass=inetOrgPerson). - Username is the attribute used for username matching. For example:
uidorcn. - ID Attribute is the attribute to map to the HM user ID. For example:
uidorcn. - Email Attribute is the attribute to map to the HM user email. For example:
mail. - Name Attribute is the attribute to map to the HM user display name. For example:
cnordisplayName.
- Base DN is the base distinguished name for user searches. For example:
(Optional) To enable role mapping, configure group search settings: Where:
- Base DN is the base distinguished name for group searches. For example:
ou=Groups,dc=example,dc=com. - Filter is the LDAP filter for finding group entries. For example:
(objectClass=groupOfNames). - Name Attribute is the attribute to map to the group name. For example:
cn. - User Matchers define how to match users to groups. Each matcher specifies:
- User Attribute is the user attribute to match. For example:
DNoruid. - Group Attribute is the group attribute that contains user references. For example:
memberormemberUid.
- User Attribute is the user attribute to match. For example:
Example configuration for OpenLDAP with
groupOfNames:- Base DN:
ou=Groups,dc=example,dc=com - Filter:
(objectClass=groupOfNames) - Name Attribute:
cn - User Matcher: User Attribute
DN, Group Attributemember
Example configuration for Active Directory:
- Base DN:
CN=Users,DC=example,DC=com - Filter:
(objectClass=group) - Name Attribute:
cn - User Matcher: User Attribute
DN, Group Attributemember
- Base DN is the base distinguished name for group searches. For example:
Select Save.
Configuring an OIDC IdP
You can use any identity provider that supports OpenID Connect (OIDC), such as Okta, Microsoft Entra ID, Google Workspace, or Keycloak.
Starting the OIDC configuration in HM
In the HM console, select Settings > Identity Providers.
Select Add Identity Provider.
Select the OIDC tab.
Copy the Redirect URI displayed on the page (you need this for your IdP).
Configuring your identity provider
In a separate browser tab, register a new application in your OIDC provider:
Create a new OIDC or OAuth 2.0 application.
Enter a name for the application.
Set the Redirect URI (also called Callback URL) to the value copied from HM.
Ensure the application is configured to include
nameandemailclaims in the ID token or UserInfo endpoint.Save the application.
Record the following values from your IdP:
- Issuer URL (for example,
https://accounts.google.com) - Client ID
- Client Secret
- Issuer URL (for example,
Assign the users you want to have access to HM to the registered application.
Completing the OIDC configuration in HM
Return to the HM browser tab and enter the following:
In the Name field, enter a unique name for this identity provider.
In the Description field, enter an optional description.
Enter the values from your OIDC provider: Where:
- Issuer URL is the issuer URL of your OIDC provider.
- Client ID is the client ID assigned to your registered application.
- Client Secret is the client secret assigned to your registered application.
(Optional) To enable role mapping, configure group claim settings: Where:
- Groups Key is the claim name that contains the user's group memberships in the ID token or UserInfo response. For example:
groups.
Note
Configure your OIDC provider to include group membership claims in the ID token or UserInfo response. The exact configuration varies by provider. Refer to your provider's documentation for configuring group claims.
- Groups Key is the claim name that contains the user's group memberships in the ID token or UserInfo response. For example:
Select Save.
Testing the IdP integration
After configuring an identity provider, you can verify if the integration is working correctly using the built-in test feature. The test performs a sign-in attempt through the configured IdP and validates that the IdP returns user attributes such as email and name correctly.
In the HM console, select Settings > Identity Providers.
Select the IdP you want to test.
Select Test Connection.
Follow the sign-in prompts from your IdP. After authentication is complete, the HM console displays the test result indicating whether the integration is set up correctly.
Managing the IdP
In HM, manage IdP providers by editing or deleting them, and assign users to restrict access to authorized users only.
Granting users access through the IdP
Users are automatically associated with an IdP when they first log in to HM through it. To grant users access:
- In your IdP's admin console, assign the users you want to give access to HM.
- Share the Quick Sign-in URL with your users:
- In the HM console, select Settings > Identity Providers.
- Select the IdP and copy the Quick Sign-in URL.
- When users log in using this URL, they are automatically registered in HM and associated with the IdP.
Removing the IdP from HM
You must first delete all users who logged in through that IdP before you can delete the IdP from HM. The delete option is disabled for an IdP unless all users associated with it have been deleted.
In the HM console, select User Management.
Identify and delete all users associated with the IdP you want to remove.
Select Settings > Identity Providers.
Select the IdP you want to remove and select Delete.
Confirm the deletion.