-
Notifications
You must be signed in to change notification settings - Fork 5
Add Cloud Pro SSO documentation #1213
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: master
Are you sure you want to change the base?
Changes from all commits
File filter
Filter by extension
Conversations
Jump to
Diff view
Diff view
There are no files selected for viewing
| Original file line number | Diff line number | Diff line change |
|---|---|---|
| @@ -0,0 +1,103 @@ | ||
| --- | ||
| title: "Single sign-on (SSO)" | ||
| description: "Configure single sign-on for a Seqera Platform Cloud organization." | ||
| date created: "2026-03-10" | ||
| last updated: "2026-03-10" | ||
| tags: [sso, authentication, organization-settings, cloud-pro] | ||
| --- | ||
|
|
||
| Single sign-on (SSO) lets a Seqera Platform Cloud organization use its corporate identity provider (IdP) for authentication. After SSO is enabled, users with a matching email domain are routed to the organization's IdP when they sign in. | ||
|
|
||
| SSO is available for **Cloud Pro** organizations and uses Auth0 self-service SSO to connect supported SAML and OpenID Connect (OIDC) identity providers. | ||
|
|
||
| ## Before you begin | ||
|
|
||
| - SSO is available only for [Cloud Pro](https://seqera.io/pricing/) organizations. | ||
| - Only organization owners should configure or manage SSO. For more information, see [User roles](./roles). | ||
| - Your organization must claim an email domain that is not already claimed by another organization. | ||
| - All existing organization members should use email addresses on the domain you want to claim. If members use other domains, Seqera blocks setup until that mismatch is resolved. | ||
| - Domain ownership is verified during setup before the connection can be activated. | ||
|
|
||
| :::caution | ||
| After SSO is enabled, users on the claimed domain authenticate through the configured IdP. If the IdP is unavailable, those users can't fall back to another login method. | ||
| ::: | ||
|
|
||
| ## Organization settings states | ||
|
|
||
| In **Organization settings**, the SSO experience depends on your subscription tier: | ||
|
|
||
| - Cloud Pro organization owners see an option to configure SSO. | ||
| - Cloud Basic organization owners see an upgrade prompt stating that enterprise SSO is available on Cloud Pro, with a link to pricing information. | ||
|
|
||
| ## Configure SSO | ||
|
|
||
| 1. Open your organization, then select **Settings**. | ||
| 2. Choose the option to configure SSO and enter the email domain your organization wants to claim. | ||
| 3. Use the setup link generated by Seqera to open the Auth0 self-service SSO wizard. | ||
| 4. In the wizard, select your identity provider and complete the provider-specific configuration. | ||
| 5. Run the connection test in the Auth0 wizard to confirm that authentication works. | ||
| 6. Complete domain ownership verification in the wizard. | ||
| 7. Return to Seqera and select **Enable SSO** to activate the connection. | ||
|
|
||
| Seqera validates the domain again when you enable the connection. If the domain configured in the wizard no longer matches the domain claimed in Seqera, activation fails and you must correct the mismatch before continuing. | ||
|
|
||
| ## Sign-in behavior | ||
|
|
||
| When an organization has active SSO: | ||
|
|
||
| - The Seqera login flow starts with an email-first step. | ||
| - Users whose email domain matches an active SSO connection are redirected to their corporate IdP. | ||
| - Users whose email domain does not match an SSO connection continue with the standard Seqera login options. | ||
| - Users who previously signed in with a social provider and have a matching SSO domain are redirected to the corporate IdP instead. | ||
|
|
||
| ## User provisioning and account linking | ||
|
|
||
| When a user signs in through an active SSO connection for the first time: | ||
|
|
||
| - New users are automatically added to the organization as members. | ||
| - Existing Seqera accounts with the same email are linked to the SSO identity instead of creating a duplicate user. | ||
| - Existing organization memberships, workspace roles, ownership, and run history are preserved. | ||
|
|
||
| Newly provisioned users receive the lowest organization-level role by default. Organization owners can then promote those users or grant workspace-level access as needed. | ||
|
|
||
| Organization owners can also review whether existing users have been linked to the organization's SSO identity from the organization membership view. | ||
|
Contributor
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. @llewellyn-sl @justinegeffen - We should say something about blocking Collaborators. Something like: 'Note that enabling SSO for an org blocks collaborator assignment — external users must be invited as org members instead. Any existing collaborators must be removed or converted to org members before the domain can be claimed.' cc: @swingingsimian . |
||
|
|
||
| ## Manage an existing connection | ||
|
|
||
| Organization owners can manage the SSO connection from **Organization settings**: | ||
|
|
||
| - Suspend SSO enforcement without deleting the existing configuration. | ||
| - Re-activate a previously disabled connection. | ||
| - Open a management link for IdP-side changes, such as certificate rotation or provider configuration updates. | ||
| - Delete the connection and release the claimed domain. | ||
|
|
||
| :::note | ||
| You can't change the claimed domain through the edit flow. To move SSO to a different domain, delete the existing connection and create a new one. | ||
| ::: | ||
|
|
||
| ## Audit log coverage | ||
|
|
||
| SSO activity is recorded in the audit log for compliance and troubleshooting. Audit coverage includes: | ||
|
|
||
| - SSO configuration changes such as create, enable, disable, and delete | ||
| - User creation through SSO provisioning | ||
| - User sign-in events that include the authentication method | ||
| - Identity-linking updates for existing users | ||
|
|
||
| ## Troubleshooting | ||
|
|
||
| **The setup link isn't generated** | ||
|
|
||
| Check whether your organization already contains members with email addresses outside the domain you are trying to claim. | ||
|
|
||
| **The claimed domain is rejected** | ||
|
|
||
| The domain may already be claimed by another organization. In that case, contact Seqera support. | ||
|
|
||
| **Users are not redirected to the corporate IdP** | ||
|
|
||
| Confirm that SSO is enabled for the organization and that the user's email domain matches the claimed domain. | ||
|
|
||
| **An existing user sees a linking problem during login** | ||
|
|
||
| If Seqera can't link an existing account to the SSO identity, the user should contact an organization owner or Seqera support before trying again. | ||
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
@llewellyn-sl @justinegeffen - One question: do we think this is the right place for the page to live? Thinking out loud, would "Get started" section make more sense?