Skip to main content
Version: 2.1

SSO Providers

The SSO Configuration tab in the Identity & Access module allows you to configure Single Sign-On providers for enterprise authentication. Users can authenticate through external identity providers instead of managing passwords locally.

Licensing

SSO configuration requires the SSO feature to be enabled in your license. When SSO is not licensed:

  • The SSO configuration tab displays an informational screen and no providers can be created or managed.
  • The login page does not display any SSO provider buttons, even if providers were previously configured.
  • SSO authentication attempts are rejected by the backend with a 403 status.
  • Existing provider configurations are preserved and become functional again if the SSO feature is re-enabled.

Supported Provider Types

MaestroHub supports three SSO protocols:

SSO provider types: OpenID Connect, SAML 2.0, and LDAP/Active Directory
ProtocolBest ForDetails
OpenID Connect (OIDC)Cloud identity providers — Google, Microsoft, Okta, Auth0OIDC Configuration Guide
SAML 2.0Enterprise identity providers — large organizations, corporate SSOSAML Configuration Guide
LDAP / Active DirectoryOn-premise directory services — Active Directory, OpenLDAPLDAP Configuration Guide

Provider List

Navigate to Identity & Access → SSO Configuration to see all configured providers. This tab is visible only to users with the System Administrator role.

Five stat cards appear at the top:

CardDescription
Total ProvidersTotal count with number of enabled providers
OIDC ProvidersCount of OpenID Connect providers
SAML ProvidersCount of SAML 2.0 providers
LDAP ProvidersCount of LDAP/AD providers
System StatusOverall health indicator

The table lists all providers with the following columns:

ColumnDescription
ProviderIcon, name (clickable), and slug
TypeBadge showing OIDC, SAML, or LDAP
StatusEnabled or Disabled
Created ByUser who created the provider and when
Updated ByUser who last modified the provider and when
ActionsEdit, Test Connection, Delete

Use the controls above the table to filter by type (OIDC, SAML, LDAP), status (Enabled, Disabled), or search by name. Sort by any column.

Creating a Provider

  1. Click Add Provider.
  2. Select the provider type: OpenID Connect, SAML 2.0, or LDAP/Active Directory.
  3. Fill in the configuration form — see the individual provider guides linked above for field details.
  4. Use Test Connection to verify the configuration before saving.
  5. Click Create to save the provider.

Common Fields (All Providers)

Every provider shares these base fields:

FieldTypeRequiredDescription
Provider NameTextYesDisplay name (min 2 characters). Shown to users on the login page.
SlugTextYesURL-friendly identifier. Auto-generated from the name. Lowercase letters, numbers, and hyphens only. Cannot be changed after creation.
DescriptionTextareaNoOptional note about the provider's purpose or intended user group.
PriorityNumberNoDisplay order on the login page. Lower numbers appear first. Default: 0.
Enable ProviderSwitchNoWhether users can authenticate with this provider. Default: enabled. Only shown when editing.

Testing a Provider

You can test provider connectivity in two ways:

From the configuration form:

  1. Fill in the required fields.
  2. Click Test Connection at the bottom of the form.
  3. The system verifies connectivity and displays a success or error message.

From the provider list:

  1. Click the actions menu on any provider row.
  2. Select Test Connection.
  3. The test runs against the saved configuration.

What each test does:

  • OIDC — Fetches the OpenID Connect Discovery Document from the issuer URL.
  • SAML — Fetches and validates the IdP metadata (URL or XML).
  • LDAP — Connects to the LDAP server and performs a service account bind.

Managing Providers

Enable / Disable

Edit a provider and toggle the Enable Provider switch. Disabled providers remain fully configured but do not appear on the login page.

Delete

  1. Click the actions menu on the provider row and select Delete.
  2. Type the provider name to confirm.
  3. Click Delete Provider.
warning

Deleting a provider is permanent. Users who previously authenticated with this provider will lose their SSO access. Consider disabling the provider first to test the impact.

Role Mapping

All three provider types support optional role mapping — automatically assigning MaestroHub roles to users based on their group memberships in the identity provider.

FieldDescription
Enable Role MappingToggle to activate role mapping for this provider.
Role ClaimThe claim or attribute that contains groups/roles. Default varies by provider type.
Default RoleRole assigned when no mapping matches. Default: Member.
Strict EnrollmentWhen enabled, users whose groups don't match any mapping are blocked from logging in.
MappingsKey-value pairs mapping IdP group names to MaestroHub roles.

Role mapping behavior:

  1. The system reads the user's groups from the configured claim/attribute.
  2. Each group is checked against the mappings table.
  3. All matched roles are assigned to the user.
  4. If no mapping matches, the Default Role is assigned.
  5. If Strict Enrollment is enabled and no mapping matches, authentication is rejected.

For detailed field references, see the individual provider guides: