Identity Providers (IdPs) are services that manage user accounts. As organizations grow, it's common for teams to integrate internal tooling with a third-party IdP. This allows administrators to monitor application access, user permissions, and security policies from a single place. It also makes it easy for individual users to access the tools they need.
Astro supports integrations with the following IdPs:
This guide provides setup steps for integrating both of these identity providers on Astro. Once you complete the integration for your organization:
- Users will automatically be authenticated to Astro if they're already logged in to your IdP.
- Users will no longer have to repeatedly login and remember credentials for their account.
- You will have complete ownership over credential configuration and management on Astro.
- You can enforce multi-factor authentication (MFA) for users.
- You can use services such as Adaptive Authentication and Conditional Access to create advanced access policies that enforce trusted IP ranges or limit access to authorized devices.
Astro only supports Service Provider (SP)-initiated SSO. Users are required to log in via the Cloud UI. IdP-initiated SSO is coming soon.
Configure your identity provider
- Azure AD
This section provides setup steps for setting up Okta as your IdP on Astro. After completing this setup, all users in your organization can use Okta to log in to Astro.
To integrate Okta as your IdP for Astro, you must have an Okta account with administrative access.
Step 1: Contact Astronomer support
To set up Okta as your IdP, submit a request to Astronomer support. After receiving your request, Astronomer support will provide you with the following:
- A Single Sign-On (SSO) URL
- An Audience URI
Save these values for Step 2.
Step 2: Configure Okta
Create a SAML app integration in the Okta Admin Console. See Create SAML app integrations using AIW. Complete the following fields:
- Single sign on URL:
- Audience URI (SP Entity ID):
- Name ID format:
- Application username:
- Update application username on:
Create and update
- Single sign on URL:
In the Advanced Settings section of your configuration, set the following values:
- Assertion Signature:
- Signature Algorithm:
- Digest Algorithm:
- Assertion Encryption:
In the Attribute Statements section of your configuration, create the following four attribute statements, making sure to use the exact capitalization as shown:
Name Name Format Value Unspecified user.email firstName Unspecified user.firstName lastName Unspecified user.lastName name Unspecified user.displayNameinfo
These values might be different if Okta is connected to an Active Directory. In this case, replace each
Valuewith the equivalent Active Directory values for a user's first name, last name, and full email address.
Complete the remainder of the setup as documented in Okta until you finish creating your integration.
Step 3: Provide Astronomer support with your integration information
On the page for your Okta app integration, click View Setup Instructions. Copy the values for
Single Sign-on URL and
X.509 Certificate that appear and send them to Astronomer Support.
From here, Astronomer support will finalize your organization's integration with Okta.
Step 4: Assign users to your Okta application
On the page for your Okta app integration, open the Assignments tab. Ensure that all users who will use Astro are assigned to the integration. For more information, read Okta documentation.
When a user assigned to the integration accesses Astro, they will be brought automatically to Okta after entering their email in the Cloud UI.
This section provides setup steps for setting up Azure AD as your IdP on Astro. After completing this setup, your organization's users can use Azure AD to log in to Astro.
To integrate Azure as your IdP for Astro you must have:
- An Azure subscription.
- An Azure AD tenant with
Step 1: Register Astro as an application on Azure
Follow Microsoft Documentation to register a new app. When configuring the application, set the following values:
- Name and Supported account types: Set these according to your organization's needs.
- Redirect URI: Select Web and specify
Step 2: Create a client secret
Follow Microsoft' documentation to create a client secret for your new application. Make note of the secret value for Step 4.
If you configure an expiring secret, make sure to record the expiration date and renew the secret before this date to avoid interruptions to your service.
Step 3: Configure API permissions
Follow Microsoft's documentation to add the following Delegated permissions to Microsoft Graph:
If your Azure Active Directory is configured to require admin approval on API permissions, make sure to also click the Grant admin consent button at the top of your permissions list.
Step 4: Provide Astronomer with your Azure AD app information
Reach out to Astronomer support and provide the following information from your Azure AD application:
- Microsoft Azure AD Domain: Retrieve this from your Azure AD directory's overview page in the Microsoft Azure portal.
- Application (client) ID: Retrieve this from the Overview page of your application.
- Client secret: Use the value of your client secret from Step 2.
From here, Astronomer will complete the integration and add Azure as your organization's IdP.
Step 5: Assign users to your Azure AD application
Follow Microsoft documentation to assign users from your organization to your new application.
When a user assigned to the application accesses Astro, they will be brought automatically to Azure AD after entering their email in the Cloud UI.