Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

SSO Azure requirements #615

Closed
wants to merge 30 commits into from
Closed

SSO Azure requirements #615

wants to merge 30 commits into from

Conversation

fiquick
Copy link
Collaborator

@fiquick fiquick commented Feb 26, 2025

No description provided.

@fiquick fiquick added the WIP label Feb 27, 2025
@fiquick
Copy link
Collaborator Author

fiquick commented Mar 3, 2025

Copy link
Collaborator

@AlexicaWright AlexicaWright left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Left some comments! Also, if we add this level of detail about Azure, we need to do the same for Okta.

Comment on lines +15 to +17
As the service provider, Neo4j Aura redirects authentication requests to the configured identity provider (IDP) using the OpenID Connect (OIDC) protocol.
When a user attempts to log in, Aura generates a redirect URL with authentication parameters and sends the user to the IDP for authentication.
Upon successful login, the IDP redirects the user back to Aura with a secure token, allowing Aura to establish an authenticated session.
Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
As the service provider, Neo4j Aura redirects authentication requests to the configured identity provider (IDP) using the OpenID Connect (OIDC) protocol.
When a user attempts to log in, Aura generates a redirect URL with authentication parameters and sends the user to the IDP for authentication.
Upon successful login, the IDP redirects the user back to Aura with a secure token, allowing Aura to establish an authenticated session.

This is TMI.

Comment on lines 22 to 23
SSO is a log-in method.
Access, roles, and permissions are dictated by role-based access control (RBAC).
Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This is a little out of place here. I'd move this to the introduction.

* Updating SSO on already running instances

If you require support assistance, visit link:https://support.neo4j.com/[Customer Support] and raise a support ticket including the following information:
== Support
Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
== Support

The previous section is already about Support.

Comment on lines +159 to +168
== FAQ

*Can users get roles added to them in Aura console via SSO and a group to role mapping?*

No, users must be granted the role on the org via Aura console invites and access management like with any other organization.

*Why am I unable to connect to the instance after completing the SSO login, the connection is showing as unconnected?*

Ensure that the email field is provided on your user in Entra. If it already is, contact support for further assistance.

Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Rewrite, we try to avoid FAQs in the docs. You can use admonitions or just running text to say the same thing.

@neo-technology-commit-status-publisher
Copy link
Collaborator

Thanks for the documentation updates.

The preview documentation has now been torn down - reopening this PR will republish it.

@fiquick
Copy link
Collaborator Author

fiquick commented Mar 3, 2025

closing - and absorbing into "Azure requirements" PR

@fiquick fiquick closed this Mar 3, 2025

As the service provider, Neo4j Aura redirects authentication requests to the configured identity provider (IDP) using the OpenID Connect (OIDC) protocol.
When a user attempts to log in, Aura generates a redirect URL with authentication parameters and sends the user to the IDP for authentication.
Upon successful login, the IDP redirects the user back to Aura with a secure token, allowing Aura to establish an authenticated session.

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
Upon successful login, the IDP redirects the user back to Aura with a secure token, allowing Aura to establish an authenticated session.
Upon successful authentication, the IDP redirects the user back to Aura with a secure token, allowing Aura to establish an authenticated session.

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Just to be a little more clear that we mean IDP login and not Aura login.


Single Sign-On (SSO) enables you to use your organization’s identity provider (IDP) to authenticate users so they can access the Aura console and Aura instances.

Aura supports SSO authentication and authorization using https://learn.microsoft.com/en-us/entra/identity-platform/v2-protocols-oidc[Microsoft Entra] and link:https://developer.okta.com/docs/guides/oin-sso-overview/[Okta] as identity providers, implementing the OpenID Connect (OIDC) protocol.

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
Aura supports SSO authentication and authorization using https://learn.microsoft.com/en-us/entra/identity-platform/v2-protocols-oidc[Microsoft Entra] and link:https://developer.okta.com/docs/guides/oin-sso-overview/[Okta] as identity providers, implementing the OpenID Connect (OIDC) protocol.
Aura supports SSO authentication and authorization using https://learn.microsoft.com/en-us/entra/identity-platform/v2-protocols-oidc[Microsoft Entra] and link:https://developer.okta.com/docs/guides/oin-sso-overview/[Okta] as identity providers, implementing the OpenID Connect (OIDC) protocol. Aura also supports authenticating with Google as the identity provider.

Just to be consistent.


*Project level-testing*

Keep the User/password login enabled, so that if SSO fails, you can still access the Aura console and adjust the configuration.

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

If instance SSO fails, support has to intervene. Users cannot adjust the configuration themselves, even with an alternative login method.

Suggested change
Keep the User/password login enabled, so that if SSO fails, you can still access the Aura console and adjust the configuration.
Keep the User/password login enabled, so that if SSO fails, you can still access the database.

@@ -6,9 +6,19 @@ label:AuraDB-Virtual-Dedicated-Cloud[]
label:AuraDB-Business-Critical[]
label:AuraDS-Enterprise[]

== Introduction to SSO

Single Sign-On (SSO) enables you to use your organization’s identity provider (IDP) to authenticate users so they can access the Aura console and Aura instances.

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Should be "IdP" right?


*Organization-level testing*

Keep the Email/password log-in method enabled, so that if SSO fails, you can still access the Aura console and adjust the configuration.

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
Keep the Email/password log-in method enabled, so that if SSO fails, you can still access the Aura console and adjust the configuration.
Keep the Email/password or Google log-in method enabled, so that if SSO fails, you can still access the Aura console and adjust the configuration.


. Select if you want the SSO config to be applied to organization logins, to specific projects within the organization, or both

. For IdP Type select *Azure Active Directory*

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
. For IdP Type select *Azure Active Directory*
. For IdP Type select *Microsoft Entra ID*


. The _Project ID_ of the projects you want to use SSO for. Click on the project settings to copy the ID.

. The name of your IdP

== Azure config

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Not sure if it should be referred to as Azure or Microsoft Entra ID in this section


*Why am I unable to connect to the instance after completing the SSO login, the connection is showing as unconnected?*

Ensure that the email field is provided on your user in Entra. If it already is, contact support for further assistance.

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
Ensure that the email field is provided on your user in Entra. If it already is, contact support for further assistance.
Ensure that the email field is provided on your user in Microsoft Entra ID. If it already is, contact support for further assistance.


Login to the Aura console with SSO.

*Project level-testing*

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
*Project level-testing*
*Project-level testing*

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Projects
None yet
Development

Successfully merging this pull request may close these issues.

4 participants