You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/admin/runai-setup/authentication/sso.md
+42-34Lines changed: 42 additions & 34 deletions
Original file line number
Diff line number
Diff line change
@@ -41,37 +41,44 @@ You can configure your IdP to map several IdP attributes:
41
41
42
42
## Step 1: UI Configuration
43
43
44
-
1. Open the Administration User interface.
45
-
2. Go to `Settings | General`.
46
-
3. Turn on `Login with SSO`.
47
-
4. Enter the administrator email.
48
-
5. Select the SSO protocol. Choose `Saml 2` or `Open ID Connect`.
49
-
50
-
!!! Note
51
-
Use your SAML response file to fill in the fields below.
52
-
53
-
For `Saml 2`:
54
-
55
-
1. In the `Metadata XML Url` field, enter the URL to the XML Metadata file.
56
-
2. Find your identity provider's attribute names for `GID`, `GROUPS`, `SUPPLEMENTARYGROUPS` and `UID`. If they are not in line with the Run:ai defaults described in the table above, you can change them here.
57
-
3. In the `Logout uri` field, enter the desired URL logout page. If left empty, you will be redirected to the Run:ai portal.
58
-
4. Press `Save`.
59
-
60
-
For `Open ID Connect`:
61
-
62
-
:octicons-versions-24: Version 2.10 and later.
63
-
64
-
1. In the `Discovery Document URL` field, enter the URL to the discovery document.
65
-
2. In the `Client ID` field, enter the client ID.
66
-
3. In the `Client Secret` field, enter the client secret.
67
-
4. Find your identity provider's attribute names for `GID`, `GROUPS`, `SUPPLEMENTARYGROUPS` and `UID`. If they are not in line with the Run:ai defaults described in the table above, you can change them here.
68
-
5. In the `Logout uri` field, enter the desired URL logout page. If left empty, you will be redirected to the Run:ai portal.
69
-
6. Press `Save`.
70
-
71
-
Once you press `Save` you will receive a `Redirect URI` and an `Entity ID`. Both values must be set on the IdP side.
44
+
1. Press the `Tools & Settings` then press `General`.
45
+
2. Open the `Security` pane and press `+Identity provider`.
46
+
3. Select the SSO protocol. Choose `SAML 2` or `Open ID Connect`.
47
+
48
+
=== "SAML 2"
49
+
50
+
1. Choose `From computer` or `From URL`.
51
+
52
+
1. For `From computer`, press the `Metadata XML file` field, then select your file for upload.
53
+
2. For `From URL`, in the `Metadata XML Url` field, enter the URL to the XML Metadata file.
54
+
55
+
2. Copy the `Redirect URL` and `Entity ID` and use them in your identity provider.
56
+
3. In the `User attributes` field enter the attribute and the value in the identity provider. (optional)
57
+
4. When complete, press `Save`.
58
+
59
+
After you have configured the SAML 2 settings, you can download the XML file, and view the identity provider settings.
60
+
61
+
Press `Download` to download the file.
62
+
63
+
Pres `Edit` to both download the file, and view the:
64
+
65
+
* Identity provider URL.
66
+
* Identity provider entity ID.
67
+
* Certificate expiration date.
68
+
69
+
=== "Open ID Connect"
70
+
71
+
1. In the `Discovery URL` field, enter the discovery URL .
72
+
2. In the `Client ID` field, enter the client ID.
73
+
3. In the `Client Secret` field, enter the client secret.
74
+
4. In the `User attributes` field enter the attribute and the value in the identity provider. (optional)
75
+
5.When complete, press `Save`.
76
+
77
+
4. In the `Logout uri` field, enter the desired URL logout page. If left empty, you will be redirected to the Run:ai portal.
78
+
5. In the `Session timeout` field, enter the amount of idle time before users are automatically logged out. (Default is 60 minutes)
72
79
73
80
!!! Important Note
74
-
Upon pressing `Save`, all existing users will be rendered non-functional, and the only valid user will be the *Administrator email* entered above. You can always revert by disabling *Login via SSO*.
81
+
When pressing `Save`, all existing users will be rendered non-functional. You can always revert by deleting the identity provider.
75
82
76
83
### Test
77
84
@@ -82,14 +89,15 @@ Test Connectivity to Administration User Interface:
82
89
* You will be redirected to the IdP login page. Use the previously entered *Administrator* email* to log in.
83
90
84
91
### Troubleshooting
92
+
85
93
The SSO login can be separated into two parts:
86
94
87
95
1. Run:ai redirects to the IdP (for example, Google) for login using a *SAML Request*.
88
96
2. Upon successful login, IdP redirects back to Run:ai with a *SAML Response*.
89
97
90
98
You can follow that by following the URL changes from [app.run.ai](https://app.run.ai) to the IdP provider (for example, [accounts.google.com](https://accounts.google.com)) and back to [app.run.ai](https://app.run.ai):
91
99
92
-
* If there is an issue on the IdP site (for example, `app_is_not_configred` error in Google), the problem is likely to be in the SAML Request.
100
+
* If there is an issue on the IdP site (for example, `app_is_not_configured` error in Google), the problem is likely to be in the SAML Request.
93
101
* If the user is redirected back to Run:ai and something goes wrong, the problem is most likely in the SAML Response.
94
102
95
103
#### Troubleshooting SAML Request
@@ -233,7 +241,7 @@ Check in the above that:
233
241
234
242
## Step 2: Cluster Authentication
235
243
236
-
Researchers should be authenticated when accessing the Run:ai GPU Cluster. To perform that, the Kubernetes cluster and the user's Kubernetes profile must be aware of the IdP. Follow the instructions [here](researcher-authentication.md). If you have followed these instructions in the past, you must **do so again** and replace the client-side and server-side configuration values with the new values as provided by on `Settings | General | Researcher Authentication`.
244
+
Researchers should be authenticated when accessing the Run:ai GPU Cluster. To perform that, the Kubernetes cluster and the user's Kubernetes profile must be aware of the IdP. Follow the instructions [here](researcher-authentication.md). If you have followed these instructions in the past, you must **do so again** and replace the client-side and server-side configuration values. To see the new values, press `Tools & Settings` then `General`, and expand the `Cluster Authentication` pane.
237
245
238
246
### Connectivity test
239
247
@@ -245,7 +253,7 @@ Test connectivity to Run:ai command-line interface:
245
253
246
254
## Step 3: UID/GID Mapping
247
255
248
-
Configure the IdP to add UID, GID, and Supplementary groups in the IdP.
256
+
You can configure the IdP to add UID, GID, and Supplementary groups in the IdP. To configure, see [UI Configuration](#step-1-ui-configuration).
249
257
250
258
### Mapping test
251
259
@@ -270,13 +278,13 @@ The latter option is easier to maintain.
270
278
271
279
### Adding Roles for a User
272
280
273
-
* Go to `Settings | Users`.
281
+
* Go to `Tools & Settings`, then press `Users`.
274
282
* Select the `Users` button at the top.
275
283
* Map users as explained [here](../../admin-ui-setup/admin-ui-users.md).
276
284
277
285
### Mapping Role Groups
278
286
279
-
* Go to `Settings | Users`.
287
+
* Go to Go to `Tools & Settings`, then press `Users`.
280
288
* Select the `Groups` button.
281
289
* Assuming you have mapped the IdP `Groups` attribute as described in the prerequisites section above, add a name of a group that has been created in the directory and create an equivalent Run:ai Group.
282
290
* If the role group contains the `Researcher` role, you can assign this group to a Run:ai Project. All members of the group will have access to the cluster.
0 commit comments