Skip to content

Commit

Permalink
Add Tcloud SSO docs (#3827)
Browse files Browse the repository at this point in the history
  • Loading branch information
afzaljasani authored Feb 19, 2025
1 parent 3639bd4 commit a354bf2
Show file tree
Hide file tree
Showing 13 changed files with 196 additions and 0 deletions.
195 changes: 195 additions & 0 deletions docs/cloud/features/single_sign_on.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,195 @@
# SSO (Single Sign-On)

## Overview

Tobiko Cloud supports single sign-on (SSO) through OpenID and SAML 2.0 providers.

This makes it easy to provision access to users and simplifies authentication.


## Setup & Prerequsites

You must have an active Tobiko Cloud instance with SSO enabled. Please contact your account team to ensure this is enabled.

If your Tobiko Cloud instance is setup to require SSO, then you won't need to provide a token in your `tcloud.yml` configuration.

Below is an example of a `tcloud.yml` configuration:
```yaml
projects:
<Project name>:
url: <The project URL>
token: <The access token> # you won't need this anymore
gateway: <The name of the SQLMesh gateway to use with this project>
extras: <Optional - Any extras that should be installed with sqlmesh-enterprise>
pip_executable: <Optional - The path to the pip executable to use. Ex: `uv pip` or `pip3`. Must install packages to the python environment running the tcloud command>
default_project: <The name of a project to use by default>
```
## Identity Providers
Tobiko Cloud currently supports OpenID and SAML 2.0.
### OpenID
This provider implements [OpenID Connect Core
1.0](https://openid.net/specs/openid-connect-core-1_0.html) in order to allow us
to login with most OAuth2 login providers.
There are two ways to use OpenID Providers. The first is a
if you use a shared provider like Google, Github,
Microsoft, etc.
#### Google OAuth
To enable Google OAuth, all we need is your domain (ex: `[email protected]`, `companyname.com` is the domain). From here, we can switch SSO on with Google OAuth.

The login flow will look like the following if you access [cloud.tobikodata.com/auth/login](https://cloud.tobikodata.com/auth/login) directly from your browser. If authenticating through CLI see [here](https://sqlmesh.readthedocs.io/en/stable/cloud/features/single_sign_on/#status) for more details.

<div style="position: relative; padding-bottom: 56.25%; height: 0;"><iframe src="https://www.loom.com/embed/71da13d6fa284daca7ebc0c1f68758fe?sid=85e5f795-f40b-496d-bdf7-098ee6093468" frameborder="0" webkitallowfullscreen mozallowfullscreen allowfullscreen style="position: absolute; top: 0; left: 0; width: 100%; height: 100%;"></iframe></div>

#### Other OAuth Providers

If you use Okta and other custom OpenID/OAuth2 providers you need to add us
as an Application or Client (terms differ across providers).

You will need the following information to do this:

| Name | Purpose | Value |
|--------------|--------------------------------------------------------------------------------------------------------------------------------------|--------------------------------------------------------|
| Redirect URI | Where the OAuth provider should redirect users to after a successfull login. Can also be called "Callback URL" or something similar. | `https://cloud.tobikodata.com/auth/handler/<provider>` |
| Logout URL | Where users can go to log out of our system | `https://cloud.tobikodata.com/auth/logout` |
| Web Origin | Which host names our OAuth service uses | `https://cloud.tobikodata.com` |

Often only a Redirect URI is required, but some providers like the additional
information as well.

We will need the following information from you once you set us up:

| Name | Purpose | Example |
|---------------------------|------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|-----------------------------------------------------------------------------------------|
| Client ID | The random ID we use to communicate with their OAuth service | `<random string>` |
| Client Secret | The random secret we use to authentication with their OAuth service | `<random string>` |
| Open ID Configuration URL | This is the URL we use to gather the rest of their OpenID Configuration. We can often find this on our own and don't need to request it from them, check with the onboarding engineer to make sure we know this. |

Once we have the above information, we can enable SSO on your account. You will then follow the login flow through your provider such as logging in through Okta.

### SAML V2.0

This provider uses [python3-saml](https://github.com/SAML-Toolkits/python3-saml)
to support SAML V2.0 authentication.

#### Requirements

If you are using a SAML provider we need to receive three pieces of
information from you below:

| Name | Purpose | Example |
|-------------|----------------------------------------------------|-------------------------------------------------------------------------------------------------------------------|
| Entity ID | This is the providers Entity ID | `https://saml.example.com/entityid` |
| SSO URL | This is the URL to use for SSO | `https://mocksaml.com/api/saml/sso` |
| Certificate | The certificate of the SAML Provider in PEM format | [PEM Certificates](https://www.ssl.com/guide/pem-der-crt-and-cer-x-509-encodings-and-conversions/#ftoc-heading-1) |

We will provide a similar set of information below:

| Name | Purpose | Example |
|-------------|---------------------------------------|--------------------------------------------------------------|
| Metadata URL| TThis URL contains all of this information | `https://cloud.tobikodata.com/auth/saml/metadata/<provider>` |
| Entity ID | This is our Entity ID | `https://cloud.tobikodata.com` |
| SSO URL | This is our HTTP-Redirect Binding URL | `https://cloud.tobikodata.com/auth/saml/callback/<provider>` |
| Certificate | Our SAML Certificate | **TBD** |

All data except the certificate will change per provider. For example if we had
a provider named `acme`:

- **Metadata URL**: `https://cloud.tobikodata.com/auth/saml/metadata/acme`
- **Entity ID**: `https://cloud.tobikodata.com/auth/saml/metadata/acme`
- **SSO URL**: `https://cloud.tobikodata.com/auth/saml/callback/acme`

### Okta Integration

The following instructions will walk you through configuring Okta as your identity provider.
Log into your Okta account. Navigate to Application and create a new app. You will want to select SAML 2.0

![okta_setup_1](./single_sign_on/okta_setup_1.png)

Next, name your app "Tobiko Cloud". You can add the app logo by downloading the image [here](https://avatars.githubusercontent.com/u/113925670?s=200&v=4).

![okta_setup_2](./single_sign_on/okta_setup_2.png)

#### SAML Configurations and Settings

1. We now need to fill in the SAML Settings. Please enter the following values:


- **Single sign-on URL**: `https://cloud.tobikodata.com/auth/saml/callback/acme`
- **Audience URI (SP Entity ID)**: `https://cloud.tobikodata.com/auth/saml/metadata/acme`

![okta_setup_3](./single_sign_on/okta_setup_3.png)

2. Fill in the Attribute Statements section with email, first_name, and last_name: These are required to properly map to your users.

![okta_setup_4](./single_sign_on/okta_setup_4.png)

3. Click next and now you are on the last step. Check off the box `Contact app vendor` and hit `Finish`. Now you're all set!

![okta_setup_5](./single_sign_on/okta_setup_5.png)

Here is what you will see if you are accessing Tobiko Cloud via Okta. Click on the Tobiko Cloud icon to be redirected to the application.

![sso_okta](./single_sign_on/sso_okta.png)

## Authentication Workflow

### Status

You can see what the status of your session is with the `status` command:

``` bash
$ tcloud auth status
```


![tcloud_auth](./single_sign_on/tcloud_auth.png)

### Login

To initiliaze the login process you can run the `login` command:

``` bash
$ tcloud auth login
```

![tcloud_login](./single_sign_on/tcloud_login.png)

At this point your system browser should open and allow you to log in. If you are already logged in, this should be a very quick process. It will look like the below:

![tcloud_auth_browser_login](./single_sign_on/tcloud_auth_browser_login.png)

![tcloud_auth_browser_success](./single_sign_on/tcloud_auth_browser_success.png)



After you have authenticated, you will be prompted with a success message in your browser and a message telling you that it's safe to close your browser window. Your terminal will then have the following result:

``` bash
Success! ✅
Current Tobiko Cloud SSO session expires in 1439 minutes
```


### Logging Out

In order to delete your session information you can use the log out command:

``` bash
> tcloud auth logout
Logged out of Tobiko Cloud
> tcloud auth status
Not currently authenticated
```

![tcloud_logout](./single_sign_on/tcloud_logout.png)

Otherwise, you will be logged out automatically when the SSO session expires (every 24 hours).
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file added docs/cloud/features/single_sign_on/sso_okta.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
1 change: 1 addition & 0 deletions mkdocs.yml
Original file line number Diff line number Diff line change
Expand Up @@ -107,6 +107,7 @@ nav:
- "Alerts & Notifications": cloud/features/alerts_notifications.md
- cloud/features/debugger_view.md
- cloud/features/data_catalog.md
- cloud/features/single_sign_on.md
- Scheduler:
- "Cloud": cloud/features/scheduler/scheduler.md
- cloud/features/scheduler/airflow.md
Expand Down

0 comments on commit a354bf2

Please sign in to comment.