nx/docs/nx-cloud/private/auth-saml.md
2022-11-07 16:51:19 +00:00

160 lines
4.9 KiB
Markdown
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

# SAML Auth
SAML support for NxCloud is an addon for Nx Enterprise contracts and requires an unlock key. Please [get in touch](mailto:cloud-support@nrwl.io)
if you are interested.
### Jump To
- [Azure AD Config](#azure-active-directory-set-up)
- [Okta Config](#okta-set-up)
## Azure Active Directory Set-up
1. Create a new enterprise app
![Step 1](/nx-cloud/private/images/saml/azure_1.png)
![Step 2](/nx-cloud/private/images/saml/azure_2.png)
2. Choose “Create your own”:
![Step 3](/nx-cloud/private/images/saml/azure_3.png)
3. Give it a name
![Step 4](/nx-cloud/private/images/saml/azure_4.png)
4. Assign your users and/or groups to it:
![Step 5](/nx-cloud/private/images/saml/azure_5.png)
5. Then set-up SSO
![Step 6](/nx-cloud/private/images/saml/azure_6.png)
6. And choose SAML:
![Step 7](/nx-cloud/private/images/saml/azure_7.png)
7. Add these configuration options
1. Configure the Identifier **exactly** as `nx-private-cloud`
2. For the **Reply URL**, it should point to your Private Cloud instance URL. Make sure it ends with `/auth/saml/callback`
![Step 8](/nx-cloud/private/images/saml/azure_8.png)
8. Scroll down and manage claims:
![Step 9](/nx-cloud/private/images/saml/azure_9.png)
9. The first row should be the `email` claim, click to Edit it:
![Step 10](/nx-cloud/private/images/saml/azure_10.png)
10. Configure it as per below
1. **“Namespace”** needs to be blank
2. **“Name:”** needs to be “email”
3. See screenshot below. This is an important step, because NxCloud will expect the “email” property on each profile that logs in.
![Step 11](/nx-cloud/private/images/saml/azure_11.png)
11. Download the certificate in **Base64**:
![Step 12](/nx-cloud/private/images/saml/azure_12.png)
12. Extract the downloaded certificate value as a one-line string:
1. `awk 'NF {sub(/\r/, ""); printf "%s\\n",$0;}' azure_cert_file.cer`
2. Well use this in a bit to initialize an environment variable
13. Copy the Login URL:
![Step 13](/nx-cloud/private/images/saml/azure_13.png)
14. Then add these two env vars to your NxCloud cluster secrets (see [Helm config](#helm-config) below):
1. `SAML_CERT=<your-cert-string-from-above>`
2. `SAML_ENTRY_POINT=<your-login-url-from-above>`
## Okta Set-up
1. Create a new Okta App Integration:
![Okta 1](/nx-cloud/private/images/saml/okta_1.png)
![Okta 2](/nx-cloud/private/images/saml/okta_2.png)
2. Give it a name:
![Okta 3](/nx-cloud/private/images/saml/okta_3.png)
3. On the Next page, configure it as below:
1. The Single Sign On URL needs to point to your NxCloud instance URL and ends with `/auth/saml/callback`
2. The Audience should be `nx-private-cloud`
![Okta 4](/nx-cloud/private/images/saml/okta_4.png)
4. Scroll down to attribute statements and configure them as per below:
![Okta 5](/nx-cloud/private/images/saml/okta_5.png)
5. Click “Next”, and select the first option on the next screen.
6. Go to the assignments tab and assign the users that can login to the NxCloud WebApp:
1. **Note:** This just gives them permission to use the NxCloud web app with their own workspace. Users will still need to be invited manually through the web app to your main workspace.
![Okta 6](/nx-cloud/private/images/saml/okta_6.png)
7. Then in the Sign-On tab scroll down:
![Okta 7](/nx-cloud/private/images/saml/okta_7.png)
8. Scroll down and from the list of certificates, download the one with the “Active” status:
![Okta 8](/nx-cloud/private/images/saml/okta_8.png)
9. Extract the downloaded certificate value as a one-line string:
1. `awk 'NF {sub(/\r/, ""); printf "%s\\n",$0;}' okta.cert`
2. We will use this in a bit to initialize and environment variable
10. Then view the ldP metadata:
![Okta 9](/nx-cloud/private/images/saml/okta_9.png)
11. Then find the row similar to the below, and copy the highlighted URL (see screenshot as well):
1. ```html
<md:SingleSignOnService
Binding="urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST"
Location="https://trial-xxxxx.okta.com/app/trial-xxxxx_nxcloudtest_1/xxxxxxxxx/sso/saml"
/>
```
![Okta 10](/nx-cloud/private/images/saml/okta_10.png)
12. Then add these two env vars to your secrets (see [Helm config](#helm-config) below):
1. `SAML_CERT=<your-cert-string-from-above>`
2. `SAML_ENTRY_POINT=<your-login-url-from-above>`
# Helm config
If you are using [Helm to deploy NxCloud](https://github.com/nrwl/nx-cloud-helm) you
will need to configure the below two values, as well as make the `SAML_CERT` and `SAML_ENTRY_POINT`
env vars as secrets:
```yaml
# helm-values.yml
addonUnlockKey: '<your-unlock-key>'
saml:
enabled: true
# secrets.yml
apiVersion: v1
kind: Secret
metadata:
name: nxcloudsecret
type: Opaque
stringData:
SAML_CERT: '-----BEGIN CERTIFICATE-----\nblablablabla\n-----END CERTIFICATE-----\n'
SAML_ENTRY_POINT: 'https://some-oktaurl.com/sso/saml'
```