Enterprise SSO
Set up Single Sign-On (SSO) for enterprise authentication
Overview
Enterprise SSO allows organizations to use their existing identity provider for authentication in Gconv Prune. This guide covers setup and configuration for various SSO providers.
Supported Providers
SAML 2.0
- Okta
- Azure AD
- OneLogin
- PingIdentity
OpenID Connect
- Google Workspace
- Auth0
- Keycloak
- Custom OIDC providers
Configuration Steps
1. Provider Setup
Configure your identity provider settings:
# SAML Configuration Example
ACS URL: https://auth.gconvPrune.fun/saml2/callback
Entity ID: https://auth.gconvPrune.fun
Name ID Format: Email Address
Attributes:
- email
- firstName
- lastName
- groups
2. Firebase Configuration
Set up SAML configuration in Firebase:
import {SAMLAuthProvider} from 'firebase/auth'
const provider = new SAMLAuthProvider('saml.your-provider')
const auth = getAuth()
// Initialize SAML auth
auth.useDeviceLanguage()
await signInWithRedirect(auth, provider)
3. User Provisioning
Handle user provisioning and group mapping:
// Handle SAML response
onAuthStateChanged(auth, (user) => {
if (user) {
// User is signed in
const {displayName, email, photoURL} = user
const customClaims = user.getIdTokenResult()
// Map groups and permissions
const groups = customClaims.claims['groups']
// Set up user access based on groups
}
})
Security Best Practices
Recommendations
- Enable secure HTTPS endpoints
- Implement proper session management
- Set up appropriate timeout settings
- Configure role-based access control (RBAC)
- Regular security audits and monitoring
Need Help?
For enterprise SSO setup assistance or custom configurations, please contact our enterprise support team