Configuring your IdP in the HM console Innovation Release
- Hybrid Manager dual release strategy
- Documentation for the current Long-term support release
The IdP configuration workflow in the Hybrid Manager (HM) console automates the integration process. When you use this workflow, you don't need to manually modify the Helm chart or restart the workload. This method makes deployment consistent and reduces downtime.
Configuring a SAML IdP
You can use any identity provider (IdP) that supports SAML 2.0, such as Okta, Microsoft Entra ID, Google Workspace, or Keycloak.
Important
When you begin adding a SAML identity provider in HM, the system generates unique ACS URL and Audience URI values. These values change each time you start a new configuration. You must complete both the IdP configuration and the HM configuration in a single session without navigating away from the page.
Before you begin
- Open your IdP admin console in a separate browser tab.
- In HM, start the SAML IdP configuration to obtain the ACS URL and Audience URI.
- Copy these values to your IdP configuration immediately.
- Complete the IdP setup and obtain the SSO URL and certificate.
- Return to the HM tab (keep it open) and complete the configuration.
Starting the SAML configuration in HM
In the HM console, go to Settings then Identity Providers.
Select Add Identity Provider.
Select the SAML tab.
Copy the following values (you need these for your IdP):
- Assertion Consumer Service (ACS) URL
- Audience URI (SP Entity ID)
Note
Do not close or navigate away from this page until you complete the HM configuration.
Configuring your identity provider
In a separate browser tab, create a new SAML 2.0 application in your IdP with the following settings:
Enter a name for the SAML integration.
Enter the ACS URL from HM in the Single Sign-On URL field.
Enter the Audience URI from HM in the Audience URI (SP Entity ID) field.
Set the Name ID Format based on your requirements. See NameID formats for details.
Configure attribute mappings to include user information in the SAML assertion.
Where:
- Username is the user's unique identifier.
- Email is the user's email address.
Note
Attribute names vary by IdP. Refer to your IdP's documentation for configuring SAML attribute statements.
Save the integration.
Copy the Single Sign-On URL (also called SSO URL or Login URL) provided by your IdP.
Download the Signing Certificate provided by your IdP (as a
.pemor.cerfile).
Completing the SAML configuration in HM
Return to the HM browser tab and enter the following:
In the Name field, enter a unique name for this identity provider.
In Description, enter an optional description for this identity provider.
In Single Sign-On URL, enter the SSO URL from your IdP.
Under Signature Certificate File, upload the signing certificate from your IdP.
Under NameID Format, select the format that matches your IdP configuration.
Enter the values for Username Attribute and Email Attribute.
Where:
- Username Attribute is the attribute name containing the username (for example,
name). - Email Attribute is the attribute name containing the email address (for example,
email).
- Username Attribute is the attribute name containing the username (for example,
Select Save.
NameID formats
Select the NameID format that matches your IdP configuration:
| Format | Description | Use case |
|---|---|---|
| Email Address | User's email address | Most common. Use when users are identified by email. |
| Persistent | A persistent, opaque identifier for the user | When the IdP assigns stable user identifiers that aren't email addresses |
| Transient | A temporary identifier valid only for the current session | When privacy is required and no persistent identifier should be shared |
| X.509 Subject Name | The subject name from an X.509 certificate | When using certificate-based authentication |
Tip
If you're unsure which format to use, start with Email Address as it's the most commonly used format.
Configuring an LDAP IdP
You can configure HM to authenticate users against an LDAP directory server, such as OpenLDAP, Microsoft Active Directory, or other LDAP-compatible directories.
Requirements
Before configuring LDAP in HM, gather the following information from your LDAP administrator:
- LDAP server hostname and port
- Bind DN and password for a service account with read access
- Base DN for user searches
- User attribute names (username, email, name)
Configuring an LDAP IdP in HM
In the HM console, go to Settings then Identity Providers.
Select Add Identity Provider.
Select the LDAP tab.
In the Name field, enter a unique name for this identity provider.
In Description, enter an optional description.
Enter the LDAP server connection settings:
Where:
- Host is the LDAP server hostname. For example:
ldap.example.com. - Port is the LDAP server port. Use
389for LDAP or636for LDAPS. - Scheme is the connection protocol. Select
ldapfor unencrypted orldapsfor TLS-encrypted connections. - Use Custom Root CA enables uploading a custom CA certificate for LDAPS connections with self-signed certificates.
- Host is the LDAP server hostname. For example:
Enter the bind credentials:
Where:
- Bind DN is the distinguished name of the service account used to search the directory. For example:
cn=admin,dc=example,dc=com. - Bind Password is the password for the bind DN service account.
- Bind DN is the distinguished name of the service account used to search the directory. For example:
Enter the user search settings:
Where:
- Base DN is the base distinguished name for user searches. For example:
ou=People,dc=example,dc=com. - Filter is the LDAP filter for finding user entries. For example:
(objectClass=inetOrgPerson). - Username is the attribute used for username matching. For example:
uidorcn. - ID Attribute is the attribute to map to the HM user ID. For example:
uidorcn. - Email Attribute is the attribute to map to the HM user email. For example:
mail. - Name Attribute is the attribute to map to the HM user display name. For example:
cnordisplayName.
- Base DN is the base distinguished name for user searches. For example:
Select Save.
Configuring an OIDC IdP
You can use any identity provider that supports OpenID Connect (OIDC), such as Okta, Microsoft Entra ID, Google Workspace, or Keycloak.
Starting the OIDC configuration in HM
In the HM console, go to Settings then Identity Providers.
Select Add Identity Provider.
Select the OIDC tab.
Copy the Redirect URI displayed on the page (you need this for your IdP).
Configuring your identity provider
In a separate browser tab, register a new application in your OIDC provider:
Create a new OIDC or OAuth 2.0 application.
Enter a name for the application.
Set the Redirect URI (also called Callback URL) to the value copied from HM.
Ensure the application is configured to include
nameandemailclaims in the ID token or UserInfo endpoint.Save the application.
Note the following values provided by your IdP:
- Issuer URL (for example,
https://accounts.google.com) - Client ID
- Client Secret
- Issuer URL (for example,
Assign the users you want to have access to HM to the registered application.
Completing the OIDC configuration in HM
Return to the HM browser tab and enter the following:
In the Name field, enter a unique name for this identity provider.
In the Description field, enter an optional description.
Enter the values from your OIDC provider:
Where:
- Issuer URL is the issuer URL of your OIDC provider.
- Client ID is the client ID assigned to your registered application.
- Client Secret is the client secret assigned to your registered application.
Select Save.
Testing the IdP integration
After configuring an identity provider, you can verify if the integration is working correctly using the built-in test feature. The test performs a sign-in attempt through the configured IdP and validates that user attributes such as email and name are returned correctly.
In the HM console, go to Settings then Identity Providers.
Select the IdP you want to test.
Select Test Connection.
Follow the sign-in prompts from your IdP. After authentication is complete, the HM console displays the test result indicating whether the integration is configured correctly.
Managing the IdP
In HM, manage IdP providers by editing or deleting them, and assign users to restrict access to authorized users only.
Assigning users to the IdP
To assign users to the IdP you configured and give them access to HM:
In your IdP's admin console, assign the users you want to give access to HM.
Next to the name of the user you want to assign the IdP to, select Assign. Select Done.
In the HM console, go to Settings then Identity Providers.
Select the IdP you created and copy the value in the Quick Sign-in URL.
Removing the IdP from HM
Warning
Removing the IdP in HM deletes all users assigned to the IdP.
To remove the IdP from HM:
In the HM console, go to Settings then Identity Providers.
Select the IdP you want to remove and select Delete.
Follow the instructions in the pop-up and select Delete Identity Provider.