Single Sign-On (SSO)
🏳️ SSO/SAML is only available on the Growth, Scale, and Enterprise plans.
Aptible provides Single Sign On (SSO) to an organization's resources through a separate, single authentication service, empowering customers to manage Aptible users from their primary SSO provider or Identity Provider (IdP).
Aptible supports the industry-standard SAML 2.0 protocol for using an external provider. Most SSO Providers support SAML, including Okta and Google's GSuite. SAML provides a secure method to transfer identity and authentication information between the SSO provider and Aptible.
Each organization may have only one SSO provider configured. Many SSO providers allow for federation with other SSO providers using SAML. For example, allowing Google GSuite to provide login to Okta. If you need to support multiple SSO providers, you can use federation to enable login from the other providers to the one configured with Aptible.
Guides & Examples:
Manage SSO in the Aptible Dashboard by navigating to Settings > Single Sign-On.
Organization Login ID
When you complete Single Sign On Provider Setup, your organization's users can use the SSO link on the SSO login page to begin using the configured SSO provider. They must enter an ID unique to your organization to indicate which organization they want to access.
That ID defaults to a randomly assigned unique identifier. Account owners may keep that identifier or set an easier-to-remember one on the SSO settings page. Your organization's primary email domain or company name makes a good choice. That identifier is to make login easier for users.
❗️ Do not change your SSO provider configuration after changing the Login ID. The URLs entered in your SSO provider configuration should continue to use the long, unique identifier initially assigned to your organization. Changing the SSO provider configuration to use the short, human-memorable identifier will break the SSO integration until you restore the original URLs.
You will have to distribute the ID to your users so they can enter it when needed. To simplify this, you can embed the ID directly in the URL. For example,
https://dashboard.aptible.com/sso/example_id. Users can then bookmark or link to that URL to bypass the need to enter the ID manually. You can start the login process without knowing your organization's unique ID if your SSO provider has an application "dashboard" or listing.
Require SSO for Access
Require SSO for Access is enabled, Users can only access their organization's resources by using your configured SAML provider to authenticate with Aptible. This setting aids in enforcing restrictions within the SSO provider, such as password rotation or using specific second factors.
Require SSO for Access will prevent users from doing the following:
- Users cannot log in using the Aptible credentials and still access the organization's resources.
Manage the Require SSO for Access setting in the Aptible Dashboard by selecting Settings > Single Sign-On.
❗️ Before enforcing SSO, we recommend notifying all the users in your organization. SSO will be the only way to access your organization at that point.
CLI Token for SSO
To use the Aptible CLI with Require SSO for Access enabled, users must:
- Generate an SSO token.
- In the Aptible Dashboard, select the user's profile on the top right and then "CLI Token for SSO," which will bring you to the CLI Token SSO settings page.
- Provide the token to the CLI via the
aptible login --sso $SSO_TOKENcommand.
Exempt Users from SSO Requirement
Users exempted from the Require SSO for Access setting can log in using Aptible credentials and access the organization's resources. Users can be exempt from this setting in two ways:
- users with an Account Owner role are always exempt from this setting
- users added to the SSO Allow List
The SSO Allow List will only appear in the SSO settings once
Require SSO for Access is enabled.
We recommend restricting the number of Users exempt from the
Require SSO for Access settings, but there are some use cases where it is necessary; some examples include:
- to give contributors (e.g., consultants or contractors) access to your Aptible account without giving them an account in your SSO provider
- to grant "robot" accounts access to your Aptible account to be used in Continuous Integration/Continuous Deployment systems