Skip to content

Commit 70403cf

Browse files
Merge pull request #734 from jasonnovichRunAI/v2.17-RUN-15586-View-Edit-SSO-settings
RUN-15586 add tabs and new procedures
2 parents 8a3ab20 + 4cca5fc commit 70403cf

File tree

1 file changed

+42
-34
lines changed
  • docs/admin/runai-setup/authentication

1 file changed

+42
-34
lines changed

docs/admin/runai-setup/authentication/sso.md

Lines changed: 42 additions & 34 deletions
Original file line numberDiff line numberDiff line change
@@ -41,37 +41,44 @@ You can configure your IdP to map several IdP attributes:
4141

4242
## Step 1: UI Configuration
4343

44-
1. Open the Administration User interface.
45-
2. Go to `Settings | General`.
46-
3. Turn on `Login with SSO`.
47-
4. Enter the administrator email.
48-
5. Select the SSO protocol. Choose `Saml 2` or `Open ID Connect`.
49-
50-
!!! Note
51-
Use your SAML response file to fill in the fields below.
52-
53-
For `Saml 2`:
54-
55-
1. In the `Metadata XML Url` field, enter the URL to the XML Metadata file.
56-
2. Find your identity provider's attribute names for `GID`, `GROUPS`, `SUPPLEMENTARYGROUPS` and `UID`. If they are not in line with the Run:ai defaults described in the table above, you can change them here.
57-
3. In the `Logout uri` field, enter the desired URL logout page. If left empty, you will be redirected to the Run:ai portal.
58-
4. Press `Save`.
59-
60-
For `Open ID Connect`:
61-
62-
:octicons-versions-24: Version 2.10 and later.
63-
64-
1. In the `Discovery Document URL` field, enter the URL to the discovery document.
65-
2. In the `Client ID` field, enter the client ID.
66-
3. In the `Client Secret` field, enter the client secret.
67-
4. Find your identity provider's attribute names for `GID`, `GROUPS`, `SUPPLEMENTARYGROUPS` and `UID`. If they are not in line with the Run:ai defaults described in the table above, you can change them here.
68-
5. In the `Logout uri` field, enter the desired URL logout page. If left empty, you will be redirected to the Run:ai portal.
69-
6. Press `Save`.
70-
71-
Once you press `Save` you will receive a `Redirect URI` and an `Entity ID`. Both values must be set on the IdP side.
44+
1. Press the `Tools & Settings` then press `General`.
45+
2. Open the `Security` pane and press `+Identity provider`.
46+
3. Select the SSO protocol. Choose `SAML 2` or `Open ID Connect`.
47+
48+
=== "SAML 2"
49+
50+
1. Choose `From computer` or `From URL`.
51+
52+
1. For `From computer`, press the `Metadata XML file` field, then select your file for upload.
53+
2. For `From URL`, in the `Metadata XML Url` field, enter the URL to the XML Metadata file.
54+
55+
2. Copy the `Redirect URL` and `Entity ID` and use them in your identity provider.
56+
3. In the `User attributes` field enter the attribute and the value in the identity provider. (optional)
57+
4. When complete, press `Save`.
58+
59+
After you have configured the SAML 2 settings, you can download the XML file, and view the identity provider settings.
60+
61+
Press `Download` to download the file.
62+
63+
Pres `Edit` to both download the file, and view the:
64+
65+
* Identity provider URL.
66+
* Identity provider entity ID.
67+
* Certificate expiration date.
68+
69+
=== "Open ID Connect"
70+
71+
1. In the `Discovery URL` field, enter the discovery URL .
72+
2. In the `Client ID` field, enter the client ID.
73+
3. In the `Client Secret` field, enter the client secret.
74+
4. In the `User attributes` field enter the attribute and the value in the identity provider. (optional)
75+
5.When complete, press `Save`.
76+
77+
4. In the `Logout uri` field, enter the desired URL logout page. If left empty, you will be redirected to the Run:ai portal.
78+
5. In the `Session timeout` field, enter the amount of idle time before users are automatically logged out. (Default is 60 minutes)
7279

7380
!!! Important Note
74-
Upon pressing `Save`, all existing users will be rendered non-functional, and the only valid user will be the *Administrator email* entered above. You can always revert by disabling *Login via SSO*.
81+
When pressing `Save`, all existing users will be rendered non-functional. You can always revert by deleting the identity provider.
7582

7683
### Test
7784

@@ -82,14 +89,15 @@ Test Connectivity to Administration User Interface:
8289
* You will be redirected to the IdP login page. Use the previously entered *Administrator* email* to log in.
8390

8491
### Troubleshooting
92+
8593
The SSO login can be separated into two parts:
8694

8795
1. Run:ai redirects to the IdP (for example, Google) for login using a *SAML Request*.
8896
2. Upon successful login, IdP redirects back to Run:ai with a *SAML Response*.
8997

9098
You can follow that by following the URL changes from [app.run.ai](https://app.run.ai) to the IdP provider (for example, [accounts.google.com](https://accounts.google.com)) and back to [app.run.ai](https://app.run.ai):
9199

92-
* If there is an issue on the IdP site (for example, `app_is_not_configred` error in Google), the problem is likely to be in the SAML Request.
100+
* If there is an issue on the IdP site (for example, `app_is_not_configured` error in Google), the problem is likely to be in the SAML Request.
93101
* If the user is redirected back to Run:ai and something goes wrong, the problem is most likely in the SAML Response.
94102

95103
#### Troubleshooting SAML Request
@@ -233,7 +241,7 @@ Check in the above that:
233241

234242
## Step 2: Cluster Authentication
235243

236-
Researchers should be authenticated when accessing the Run:ai GPU Cluster. To perform that, the Kubernetes cluster and the user's Kubernetes profile must be aware of the IdP. Follow the instructions [here](researcher-authentication.md). If you have followed these instructions in the past, you must **do so again** and replace the client-side and server-side configuration values with the new values as provided by on `Settings | General | Researcher Authentication`.
244+
Researchers should be authenticated when accessing the Run:ai GPU Cluster. To perform that, the Kubernetes cluster and the user's Kubernetes profile must be aware of the IdP. Follow the instructions [here](researcher-authentication.md). If you have followed these instructions in the past, you must **do so again** and replace the client-side and server-side configuration values. To see the new values, press `Tools & Settings` then `General`, and expand the `Cluster Authentication` pane.
237245

238246
### Connectivity test
239247

@@ -245,7 +253,7 @@ Test connectivity to Run:ai command-line interface:
245253

246254
## Step 3: UID/GID Mapping
247255

248-
Configure the IdP to add UID, GID, and Supplementary groups in the IdP.
256+
You can configure the IdP to add UID, GID, and Supplementary groups in the IdP. To configure, see [UI Configuration](#step-1-ui-configuration).
249257

250258
### Mapping test
251259

@@ -270,13 +278,13 @@ The latter option is easier to maintain.
270278

271279
### Adding Roles for a User
272280

273-
* Go to `Settings | Users`.
281+
* Go to `Tools & Settings`, then press `Users`.
274282
* Select the `Users` button at the top.
275283
* Map users as explained [here](../../admin-ui-setup/admin-ui-users.md).
276284

277285
### Mapping Role Groups
278286

279-
* Go to `Settings | Users`.
287+
* Go to Go to `Tools & Settings`, then press `Users`.
280288
* Select the `Groups` button.
281289
* Assuming you have mapped the IdP `Groups` attribute as described in the prerequisites section above, add a name of a group that has been created in the directory and create an equivalent Run:ai Group.
282290
* If the role group contains the `Researcher` role, you can assign this group to a Run:ai Project. All members of the group will have access to the cluster.

0 commit comments

Comments
 (0)