Set up SSO with OpenID Connect
Single Sign-On (SSO) is an authentication scheme, allowing users to log-in with a single pair of credentials to multiple, independent software systems.
This article explains the procedure to configure single sign-on to NVIDIA Run:ai using the OpenID Connect protocol.
Prerequisites
Before you start, make sure you have the following available from your identity provider:
Discovery URL - The OpenID server where the content discovery information is published.
ClientID - The ID used to identify the client with the Authorization Server.
Client Secret - A secret password that only the Client and Authorization server know.
Optional: Scopes - A set of user attributes to be used during authentication to authorize access to a user's details.
Setup
Adding the identity provider
Go to General settings
Open the Security section and click +IDENTITY PROVIDER
Select Custom OpenID Connect
Enter the Discovery URL, Client ID, and Client Secret
Copy the Redirect URL to be used in your identity provider
Optional: Add the OIDC scopes
Optional: Enter the user attributes and their value in the identity provider as shown in the below table
Click SAVE
Optional: Enable Auto-Redirect to SSO to automatically redirect users to your configured identity provider’s login page when accessing the platform.
User role groups
GROUPS
If it exists in the IDP, it allows you to assign NVIDIA Run:ai role groups via the IDP. The IDP attribute must be a list of strings or an object where the group names are the values.
Linux User ID
UID
If it exists in the IDP, it allows Researcher containers to start with the Linux User UID. Used to map access to network resources such as file systems to users. The IDP attribute must be of type integer.
Linux Group ID
GID
If it exists in the IDP, it allows Researcher containers to start with the Linux Group GID. The IDP attribute must be of type integer.
Supplementary Groups
SUPPLEMENTARYGROUPS
If it exists in the IDP, it allows Researcher containers to start with the relevant Linux supplementary groups. The IDP attribute must be a list of integers.
Defines the user attribute in the IDP holding the user's email address, which is the user identifier in NVIDIA Run:ai
User first name
firstName
Used as the user’s first name appearing in the NVIDIA Run:ai user interface
User last name
lastName
Used as the user’s last name appearing in the NVIDIA Run:ai user interface
Testing the setup
Log in to the NVIDIA Run:ai platform as an admin
Add access rules to an SSO user defined in the IDP
Open the NVIDIA Run:ai platform in an incognito browser tab
On the sign-in page click CONTINUE WITH SSO You are redirected to the identity provider sign in page
In the identity provider sign-in page, log in with the SSO user who you granted with access rules
If you are unsuccessful signing-in to the identity provider, follow the Troubleshooting section below
Editing the identity provider
You can view the identity provider details and edit its configuration:
Go to General settings
Open the Security section
On the identity provider box, click Edit identity provider
You can edit either the Discovery URL, Client ID, Client Secret, OIDC scopes, or the User attributes
Removing the identity provider
You can remove the identity provider configuration:
Go to General settings
Open the Security section
On the identity provider card, click Remove identity provider
In the dialog, click REMOVE to confirm the action
Troubleshooting
If testing the setup was unsuccessful, try the different troubleshooting scenarios according to the error you received.
Troubleshooting scenarios
Last updated