SAML Integration#
Attention
SAML integration applies only to Determined Enterprise Edition.
Determined EE provides a SAML integration to allow users to use single sign-on (SSO) with their organization’s identity provider (IdP) and to provide system administrators better control over access to resources. Currently, the only officially supported identity provider is Okta.
Configure Your IdP#
When configuring your IdP to allow users to SSO to Determined, you will need to specify the location
of Determined’s SSO URL and the audience URL. The audience URL should be set to the Determined
master’s base URL and the SSO endpoint is at that base URL with a path of /saml/sso
.
Determined also requires an additional attribute named userName
with name format unspecified
set to the username of the user attempting SSO (e.g., for Okta, this is the attribute value
user.login
).
Configure Determined#
Determined requires your IdP’s SSO URL, descriptor SSO URL, public certificate, and name as well as
the hostname your IdP intends to use to communicate with Determined. These are all supplied in the
master.yaml
.
Example Setup with Okta#
In this example, we assume the Determined master will run at https://determined.example.com
.
First, in Okta, you’ll need to create a new SAML application and specify the following options:
Field |
Example Value |
---|---|
Single sign on URL |
|
Audience URI (SP Entity ID) |
|
Name ID format |
Unspecified |
Application username |
Okta username |
Determined also requires an attribute statement named userName
with the name format unspecified
and a value user.login
.
Okta will show that more steps are required to complete the configuration and link to a page with
their IdP SSO URL, IdP Issuer URL (synonymous to IdP Descriptor URL), and public certificate. Use
these to configure the Determined master in master.yaml
. The cert will need to be saved and
mounted into the master’s container.
saml:
enabled: true
provider: "Okta"
idp_recipient_url: "https://determined.example.com/saml/sso"
idp_sso_url: "https://myorg.okta.com/app/.../sso/saml"
idp_sso_descriptor_url: "http://www.okta.com/..."
idp_cert_path: "okta.cert"
Once the master is started with this configuration, users should be able to log in to Determined from Okta by clicking the Determined tile after they have been provisioned.