arrow-left

All pages
gitbookPowered by GitBook
1 of 4

Loading...

Loading...

Loading...

Loading...

OpenID Connect

This section includes a general guide for configuring an OpenID provider and guides for specific OpenID providers in Immuta. The getting started section below provides best practices for setup and configuration.

hashtag
Getting started with OpenID Connect

  1. Start by creating a few initial subscription and data policies so that you know the user metadata you will need from your IAM. For example, will user attributes be used to author policies, or will groups also be needed? The subscription and data policies below illustrate the need for both groups and attributes to be imported from the IAM to enforce appropriate access controls:

    1. Subscription policy: Allow all users in the Marketing group to access data sources tagged Marketing.

    2. Data policy: Mask all columns tagged Location except for users with the attribute AccessLevel.Gold.

  2. If your provider is not listed or does not support SCIM, reach out to your Immuta representative for guidance.

  3. with SCIM enabled. Guides for specific providers are linked below.

hashtag
Next steps

Once your IAM is configured, complete one of the following tasks:

Validate that your provider is supported by Immuta and supports SCIM.
Configure your OpenID provider in Immuta
Okta
OneLogin
Register data in Immuta
Author policies

Okta and OpenID Connect

hashtag
Requirement

Administrator account in Okta

hashtag
Configuration steps

hashtag
1 - Add the Immuta application in Okta

  1. Log in to Okta as an Admin, navigate to the Applications tab, and click Add Application.

  2. Search for Immuta in the search bar and click Add.

  3. Choose a name for your integration and click Next. Then select the OpenID Connect button.

hashtag
Attribute matching for SCIM

Attribute matching allows you to determine how to uniquely identify a user in Okta and match that user in Immuta during login and provisioning. Immuta supports the following matching attributes in Okta:

  • Users:

    • id

    • userName

Using any other attribute in Okta as a matching attribute results in an error. See the for details about attribute matching and how to configure it.

hashtag
2 - Add OpenID Connect in Immuta

  1. Log in to Immuta and click the App Settings icon in the navigation menu.

  2. Click the Add IAM button and enter a Display Name.

  3. Select OpenID from the Identity Provider Type dropdown menu.

hashtag
3 - Configure OpenID Connect

For details about the configuration options below and additional configuration options, see the .

  1. In the Identity Management section of the Immuta console, enter the Client ID and Client Secret you copied from Okta in the previous section.

  2. Enter the following URL in the Discover URL field: https://<your_okta_workspace.com>/.well-known/openid-configuration.

  3. Opt to add additional Scopes.

circle-exclamation

Multiple user accounts cannot have the same email address

If you register user accounts that have the same email address as an existing Immuta user account, the email field for the subsequent user accounts will be left empty. For more details, see the .

hashtag
4 - Test connection and save configuration

  1. Click the Test Connection button.

  2. Once the connection is successful, click the Test User Login button. Because this test button attempts to log in, a user or group must be assigned to the application in Okta that you have login access for.

  3. Click Save.

OpenID Connect Protocol

circle-info

Editing your IAM configuration

With the exception of the IAM ID (also called the display name), any of these can be changed after an IAM is configured. To edit IAM settings, click the dropdown arrow next to the IAM listed in the identity management section on the app settings page and then make your changes.

For details about the configuration options below and additional configuration options, see the .

Scroll down and enter the Base URL for your Immuta tenant.

  • Enter the IAM ID for your Immuta OIDC integration (if you have not created an IAM ID, you will complete that step in the next section).

  • Click Done and once the page reloads, navigate back to the Sign On tab and copy down the Client ID and Client secret.

  • email

  • displayName

  • emails[type eq "work"].value

  • Groups

    • id

    • displayName

  • If required, navigate back to Okta and enter the IAM ID below the Base URL then complete the steps from the Okta section.

    Opt to Enable SCIM support for OpenID by clicking the checkbox, which will generate a SCIM API Key. Validate that the usernames in your IAM match those in your data platform (Snowflake, Databricks, etc.). If they are incorrect in the IAM or the casing doesn't match, fix the data platform username in the identity provider before configuring SCIM in Immuta.

    1. Copy the SCIM URL and API key generated, and then save your changes.

    2. Validate the URL and credentials within the identity provider application.

  • In the Profile Schema section, map attributes in OpenID to automatically fill in a user's Immuta profile. Note: Fields that you specify in this schema will not be editable by users within Immuta.

    If usernames in your data platform align with usernames in an external IAM and those accounts align with an IAM attribute, enter the IAM attribute in the field that corresponds to your data platform:

    1. User's Databricks Username

    2. User's Snowflake Username

    3. User's Trino Username

    4. User's Azure Synapse Analytics Username

    5. User's Redshift Username

    6. User's BigQuery Username

    7. User's AWS User. After entering the IAM attribute in the User's AWS User field, click the Select AWS User Type from the dropdown and select one of the types below. This is used by the Amazon S3 Integration to map users in Immuta to the corresponding user type in AWS.

      • None (fallback to Immuta username): When selecting this option, the AWS username is assumed to be the same as the Immuta username.

      • : Only a single Immuta user can be mapped to an IAM role. This restriction prohibits enforcing policies on AWS users who could assume that role. Therefore, if using role principals, create a new user in Immuta that represents the role so that the role then has the permissions applied specifically to it.

    8. User's PostgreSQL Username

    9. User's Teradata Username

  • Opt to Allow Identity Provider Initiated Single Sign On to use the IDP-Initiated SSO feature by selecting the checkbox.

  • Opt to Migrate Users from another IAM by selecting the checkbox.

  • Okta documentationarrow-up-right
    OpenID Connect protocol reference guide
    Identity managers reference guide

    Navigate to the Immuta App Settings page.

  • Scroll to the Identity Management section and click Add IAM.

  • Complete the Display Name field and select OpenID from the Identity Provider Type dropdown.

  • Take note of the ID and copy the SSO Callback URL to use as the ACS URL in your identity provider.

  • Enter the Client ID and Client Secret from your identity provider.

  • Enter the URL of your identity provider's discovery endpoint in the Discover URL field. If you do not provide this URL, you will have to complete the manual endpoint specification fields (authorization endpoint, issuer, token endpoint, etc.).

  • Opt to add additional Scopes.

  • Enable SCIM support for OpenID by clicking the checkbox, which will generate a SCIM API Key. Validate that the usernames in your IAM match those in your data platform (Snowflake, Databricks, etc.). If they are incorrect in the IAM or the casing doesn't match, fix the data platform username in the identity provider before configuring SCIM in Immuta.

    1. Copy the SCIM URL and API key generated, and then save your changes.

    2. Validate the URL and credentials within the identity provider application.

  • In the Profile Schema section, map attributes in OpenID to automatically fill in a user's Immuta profile. Note: Fields that you specify in this schema will not be editable by users within Immuta.

    If usernames in your data platform align with usernames in an external IAM and those accounts align with an IAM attribute, enter the IAM attribute in the field that corresponds to your data platform:

    1. User's Databricks Username

    2. User's Snowflake Username

    3. User's Trino Username

    4. User's Azure Synapse Analytics Username

    5. User's Redshift Username

    6. User's BigQuery Username

    7. User's AWS User. After entering the IAM attribute in the User's AWS User field, click the Select AWS User Type from the dropdown and select one of the types below. This is used by the Amazon S3 Integration to map users in Immuta to the corresponding user type in AWS.

      • None (fallback to Immuta username): When selecting this option, the AWS username is assumed to be the same as the Immuta username.

      • : Only a single Immuta user can be mapped to an IAM role. This restriction prohibits enforcing policies on AWS users who could assume that role. Therefore, if using role principals, create a new user in Immuta that represents the role so that the role then has the permissions applied specifically to it.

    8. User's PostgreSQL Username

    9. User's Teradata Username

  • Opt to Allow Identity Provider Initiated Single Sign On to use the IDP-Initiated SSO feature by selecting the checkbox.

  • Opt to Migrate Users from another IAM by selecting the checkbox.

  • Click Test Connection and Test User Login. Because this test button attempts to log in, a user or group must exist in your identity provider that you have login access for.

  • Save your configuration.

  • circle-exclamation

    Multiple user accounts cannot have the same email address

    If you register user accounts that have the same email address as an existing Immuta user account, the email field for the subsequent user accounts will be left empty. For more details, see the Identity managers reference guide.

    settings
    OpenID Connect protocol reference guide
  • AWS Identity Center user IDs: You must use the numeric User ID value found in AWS IAM Identity Center, not the user's email address.

  • AWS IAM rolearrow-up-right
  • AWS Identity Center user IDs: You must use the numeric User ID value found in AWS IAM Identity Center, not the user's email address.

  • AWS IAM rolearrow-up-right
    AWS IAM userarrow-up-right
    AWS IAM userarrow-up-right

    OneLogin with OpenID Connect

    hashtag
    Add IAM on the app settings page

    1. Navigate to the App Settings page in the Immuta console and click the Add IAM button.

    2. Complete the Display Name field and select OpenID from the Identity Provider Type dropdown.

    3. Adjust Default Permissions granted to users by selecting from the list in this dropdown menu.

    hashtag
    Add OpenID Connect in OneLogin

    1. Navigate to OneLogin, click Administration, and then select Applications from the Applications menu.

    2. Click Add App in the top right corner of the screen. Search for and select OpenID Connect (OIDC).

    3. Complete the Display Name field and click Save.

    hashtag
    Complete the configuration

    For details about the configuration options below and additional configuration options, see the .

    1. From the Identity and Access Management window in your Immuta tenant, copy the SSO Callback URL to your clipboard.

    2. Return to OneLogin, click the Configuration tab in the left panel, and paste the URL in the Login Url and Redirect URI's fields.

    3. Click Save in the top right corner of this screen.

    circle-exclamation

    Multiple user accounts cannot have the same email address

    If you register user accounts that have the same email address as an existing Immuta user account, the email field for the subsequent user accounts will be left empty. For more details, see the .

    Click the SSO tab in the left panel of your OneLogin account. Copy the Client ID and the Client Secret and paste these values in the corresponding fields in your Immuta tenant.

  • Then, right click the Well-known Configuration text from the SSO tab of OneLogin, and copy the link to your clipboard.

  • Return to your Immuta tenant, and paste this link in the Discover URL field; pasting this link here prevents you from having to manually fill out the rest of the form.

  • Confirm email as the User ID claim, and fill out the Scopes section.

  • Return to OneLogin and scroll to the Token Endpoint section. Select POST from the Authentication Method dropdown.

  • Click Save.

  • Return to your Immuta console, opt to Enable SSL and Enable SCIM support for OpenID. Validate that the usernames in your IAM match those in your data platform (Snowflake, Databricks, etc.). If they are incorrect in the IAM or the casing doesn't match, fix the data platform username in the identity provider before configuring SCIM in Immuta.

    1. Copy the SCIM URL and API key generated, and then save your changes.

    2. Validate the URL and credentials within the identity provider application.

  • In the Profile Schema section, map attributes in OpenID to automatically fill in a user's Immuta profile. Note: Fields that you specify in this schema will not be editable by users within Immuta.

    If usernames in your data platform align with usernames in an external IAM and those accounts align with an IAM attribute, enter the IAM attribute in the field that corresponds to your data platform:

    1. User's Databricks Username

    2. User's Snowflake Username

    3. User's Trino Username

    4. User's Azure Synapse Analytics Username

    5. User's Redshift Username

    6. User's BigQuery Username

    7. User's AWS User. After entering the IAM attribute in the User's AWS User field, click the Select AWS User Type from the dropdown and select one of the types below. This is used by the Amazon S3 Integration to map users in Immuta to the corresponding user type in AWS.

      • None (fallback to Immuta username): When selecting this option, the AWS username is assumed to be the same as the Immuta username.

      • : Only a single Immuta user can be mapped to an IAM role. This restriction prohibits enforcing policies on AWS users who could assume that role. Therefore, if using role principals, create a new user in Immuta that represents the role so that the role then has the permissions applied specifically to it.

    8. User's PostgreSQL Username

    9. User's Teradata Username

  • Opt to Allow Identity Provider Initiated Single Sign On, External Groups and Attributes Endpoint, and Migrate Users.

  • Click Test Connection. Once the connection is successful, click Test User Login. Because this test button attempts to log in, a user or group must be assigned to the application in OneLogin that you have login access for.

  • Click Save.

  • OpenID Connect protocol reference guide
    Identity managers reference guide
  • AWS Identity Center user IDs: You must use the numeric User ID value found in AWS IAM Identity Center, not the user's email address.

  • AWS IAM rolearrow-up-right
    AWS IAM userarrow-up-right