summaryrefslogtreecommitdiffstats
path: root/integrations/cloud-authentication/metadata.yaml
diff options
context:
space:
mode:
Diffstat (limited to '')
-rw-r--r--integrations/cloud-authentication/metadata.yaml72
1 files changed, 70 insertions, 2 deletions
diff --git a/integrations/cloud-authentication/metadata.yaml b/integrations/cloud-authentication/metadata.yaml
index 8f461845..72f5a5fe 100644
--- a/integrations/cloud-authentication/metadata.yaml
+++ b/integrations/cloud-authentication/metadata.yaml
@@ -33,7 +33,7 @@
### Netdata Configuration Steps
1. Click on the Space settings cog (located above your profile icon)
- 2. Click on the **Authentication** tab
+ 2. Click on the **User Management** section and access **Authentication and Authorization** tab.
3. On the Okta SSO card, click on **Configure**
4. Fill in the [required credentials](https://developer.okta.com/docs/guides/find-your-app-credentials/main/), you get them from **Okta Admin Portal**:
- **Issuer URL** you can get it from your profile icon on top, e.g. `https://company-name.okta.com`
@@ -82,7 +82,7 @@
### Netdata Configuration Steps
1. Click on the Space settings cog (located above your profile icon)
- 2. Click on the **Authentication** tab
+ 2. Click on the **User Management** section and access **Authentication and Authorization** tab.
3. On the OIDC card, click on **Configure**
4. Fill in the required credentials:
- **Issuer URL** the Authorization Server Issuer URL, e.g. `https://my-auth-server.com/`
@@ -103,3 +103,71 @@
### Reference
https://openid.net/developers/how-connect-works/
+
+- id: 'scim'
+ meta:
+ name: 'SCIM'
+ link: 'https://netdata.cloud'
+ categories:
+ - auth
+ icon_filename: 'scim.svg'
+ keywords:
+ - scim
+ - identity-management
+ overview:
+ authentication_description: "The System for Cross-domain Identity Management (SCIM) specification is designed to simplify the management of user identities in cloud-based applications and services."
+ authentication_limitations: ''
+ setup:
+ description: |
+ ### Prerequisites
+ - A Netdata Cloud account
+ - Admin access to the Space
+ - The Space must be on a paid plan
+ - OIDC/SSO integration must already be enabled in one of your Spaces
+
+ ### Netdata Configuration Steps
+ 1. Click on the Space settings cog (located above your profile icon).
+ 2. Click on the **User Management** section and access **Authentication and Authorization** tab.
+ 3. In the SCIM card, click on **Activate**.
+ 4. Depending on your situation:
+ - If OIDC/SSO integration is already enabled in your Space, click **Activate**.
+ - If you already have a SCIM integration in another Space and want to create a linked integration here, enter the SCIM token from the original integration and click **Activate**.
+ 5. If the setup is successful, you will receive two parameters:
+ - **Base URL**: Use this URL as the base URL for your SCIM client.
+ - **Token**: Use this token for Bearer Authentication with your SCIM client.
+
+ ### Rotating the SCIM Token
+ You can rotate the token provided during SCIM integration setup if needed.
+
+ Steps to rotate the token:
+ 1. Click on the Space settings cog (located above your profile icon).
+ 2. Click on the **User Management** section and access **Authentication and Authorization** tab.
+ 3. In the already configured SCIM card, click **Configure**.
+ 4. Click **Regenerate Token**.
+ 5. If successful, you will receive a new token for Bearer Authentication with your SCIM client.
+
+ ### Supported Features
+ This integration adheres to SCIM v2 specifications. Supported features include:
+
+ - User Resource Management (urn:ietf:params:scim:schemas:core:2.0:User)
+ - Patch operations: Supported
+ - Bulk operations: Not supported
+ - Filtering: Supported (max results: 200)
+ - Password synchronization: Not supported, as we rely on SSO/OIDC authentication
+ - eTag: Not supported
+ - Authentication schemes: OAuth Bearer Token
+
+ ### User Keying Between SCIM and OIDC
+ Our SCIM (System for Cross-domain Identity Management) integration utilizes OIDC (OpenID Connect) to authenticate users.
+ To ensure users are correctly identified and authenticated between SCIM and OIDC, we use the following mapping:
+
+ - SCIM externalID ↔ OIDC sub
+
+ This mapping ensures that the identity of users remains consistent and secure across both systems.
+
+ **Important**: Ensure that your OIDC and SCIM systems follow this mapping strictly.
+ The externalID in SCIM must correspond to the subfield in OIDC. Any deviation from this mapping may result
+ in incorrect user identification and authentication failures.
+
+ ### Reference
+ [SCIM Specification](https://scim.org)