Configuring SAML-based SSO
Single-tenant AI Hub environments can use security assertion markup language (SAML)-based authentication to manage AI Hub access. Using SAML-based single sign-on (SSO) lets you leverage your organization’s existing SSO identity provider (IdP) to automatically create new AI Hub user accounts upon initial login.
Single tenant AI Hub uses service provider-initiated SSO authentication and supports IdPs that use SAML 2.0. Supported IdPs include:
-
Active Directory Federation Services (AD FS)
-
Auth0
-
JumpCloud
-
Microsoft Entra ID
-
Okta
-
OneLogin
-
PingFederate
Customer requirements
Enabling SSO for your single tenant AI Hub environment involves working closely with your AI Hub support team. Your support team performs the configuration steps on the AI Hub side, but it’s your responsibility to review this documentation and ensure the following customer requirements are met:
-
You’ve created an app registration in your IdP according to the IdP configuration requirements. As part of this requirement, ensure that:
-
You’ve followed the app registration requirements and can provide the SP entity ID, SP name, and ACS URL values used in your app registration.
-
You’ve met the attribute mapping requirements and all user accounts have an email address set under the
email
attribute. -
You’ve reviewed optional attributes. If intending to use SAML group mapping, you’ve included a
groups
attribute. If intending to define organization admins at the IdP level, you’ve included anis_admin
attribute.
-
-
You can provide the IdP metadata XML for your app registration, either as a file or metadata-server endpoint.
IdP configuration requirements
The SSO integration flow begins with registering your single tenant AI Hub environment as a service provider in your IdP. When creating your app registration, there are requirements that must be met, including required values and attribute mappings.
App registration requirements
When creating your app registration, there are suggested and required values for some fields, such as the redirect URL after a user authenticates. The table outlines any required or suggested values, and the name of the corresponding field in select IdPs.
Attribute requirements
Your app registration can include the following attributes (also called claims), with the attribute’s name exactly matching. For example, the attribute email
can’t be substituted with a similar attribute, such as emailAddress
.
AI Hub supports mapping group membership between SAML groups and AI Hub groups. If using mapping, you must include a groups
attribute. When your environment is available, see Managing groups for details on creating mappings.
IdP metadata XML requirements
To complete the SSO configuration on the AI Hub side, AI Hub support requires the IdP metadata XML for your app registration. AI Hub supports two methods of referencing the IdP metadata XML:
-
Local: Referencing a static
metadata.xml
file. This file is stored as a Kubernetes secret. -
Remote: Referencing a metadata-server endpoint where the XML file is hosted on the SAML provider metadata server.
This table outlines where you can find the local or remote access value in select IdPs.