Add OneLogin as an identity provider
Use OneLogin to give your organization users single sign-on (SSO) access to Aiven.
Step 1: Add the IdP in the Aiven Console
- In the organization, click Admin.
- Click Identity providers.
- Click Add identity provider.
- Select an identity provider and enter a name.
- Select a verified domain to link this IdP to. Users see linked IdPs on the login page.
On the Configuration step are two parameters that you use to set up the SAML authentication in your IdP:
- Metadata URL
- ACS URL
Step 2: Configure SAML on OneLogin
-
Log in to the OneLogin Admin console.
-
Click Applications > Add App.
-
Search for and select SAML Custom Connector (Advanced).
-
Change the Display Name to Aiven.
-
Add any other visual configurations you want and click Save.
-
In the Configuration section of the menu, set the following parameters:
Parameter Value ACS URL Validation [-a-zA-Z0-9@:%._\+~#=]{2,256}\.[a-z]{2,6}\b([-a-zA-Z0-9@:%_\+.~#?&//=]*)
ACS URL ACS URL from Aiven Console Login URL https://console.aiven.io SAML Initiator - Service Provider
- To let your users sign in through OneLogin, enter OneLogin
SAML nameID format Email -
Click Save.
-
In the SSO section, set SAML Signature Algorithm to SHA-256.
-
Copy the certificate content, Issuer URL, and SAML 2.0 Endpoint (HTTP). You'll use these for the SAML configuration in Aiven Console.
-
Click Save
-
Assign users to this application.
Step 3: Finish the configuration in Aiven
Go back to the Aiven Console to complete setting up the IdP. If you saved your IdP as a draft, you can open the settings by clicking the name of the IdP.
- In the IDP URL field, enter the SAML 2.0 Endpoint (HTTP) from OneLogin.
- In the Entity ID field, enter the Issuer URL from OneLogin.
-
Paste the certificate from the IdP into the Certificate field.
-
Optional: Paste or upload a JSON file with configuration details for your IdP.
-
Click Next.
-
Configure the security options for this IdP and click Next.
-
Require authentication context: This lets the IdP enforce stricter security measures to help prevent unauthorized access, such as requiring multi-factor authentication.
-
Require assertion to be signed: The IdP checks for a digital signature. This security measure ensures the integrity and authenticity of the assertions by verifying that they were issued by a trusted party and have not been tampered with.
-
Sign authorization request sent to IdP: A digital signature is added to the request to verify its authenticity and integrity.
-
Extend active sessions: This resets the session duration every time the token is used.
-
Enable group syncing: This syncs the group membership from your IdP to the Aiven Platform.
note- The Aiven Platform doesn't create groups with this feature. It only syncs the group membership between the groups in your IdP and the groups you create in Aiven. For user group provisioning, use SCIM.
- User group membership automatically syncs when a user logs in.
- The IdP is the single source of truth. If a group in the IdP doesn't exist in Aiven, it will be ignored. Likewise, if a user is added to a group in Aiven Console but not in the IdP, they will be removed from the Aiven group when the group membership syncs.
-
-
Optional: Select a user group to add all users who sign up with this IdP to.
-
Click Finish to complete the setup.
If you set up a SAML authentication method before and are now switching to a new IdP, existing users need to log in with the new account link URL to finish the setup.
Troubleshooting
If you get errors, you can try reapplying entitlement mappings:
- Go to the app in OneLogin and click Settings.
- Click More Actions > Reapply entitlement Mappings.