Federation and Single Sign On (SSO)
Kubeark offers a variety of capabilities for Single Sign-On (SSO) and social logins, making it easy to integrate with popular identity providers such as Google and Facebook.
With SSO, users can sign in once and access multiple applications without having to repeatedly enter their credentials. This is not only convenient for users, but also helps improve security by reducing the number of passwords users need to remember.
Kubeark allows users to authenticate with their existing social media accounts instead of creating new credentials. This makes it easy for users to get started with your application and can help increase user engagement.
Step 1: On the main Kubeark page, go to User Management and select Users. From the Users page, on the top left corner of the workspace, select IDP.
Step 2: This will take you to the User Interface of the Identity Management console. From the top right corner of the screen, select Admin interface
The Kubeark Identity console presents two different views, which are determined by the role of the user who is accessing them:
- User Interface - this is the default screen for user accounts
- Admin Interface - this is the identity management console dedicated to organization admins
Step 3: Within the Admin Interface, go to Directory > Federation & Social login
Step 4: Here you will see a list of all active sources of identities. To enable a new Identity Provider, select Create
Step 5: Choose your preferred source from the list of available providers and click Next
Step 6: In the source configuration prompt, enter all details required for configuring the new source depending on your previous selection.
When configuring federation and social login, it is important to keep in mind that the detailed configuration process may vary depending on the specific identity provider being used. For example, if you are integrating with Azure AD, you will need to follow the respective steps to enable the service from the Azure portal. Similarly, other identity providers may require different steps or configurations.
Therefore, it is recommended to refer to the official documentation or support resources provided by the identity provider to ensure that the necessary configuration is completed correctly.
By following the provider-specific guidelines, you can ensure a smooth and secure integration between your application and the identity provider.