website/integrations/infrastructure/omni/index.md
Omni manages Kubernetes on bare metal, virtual machines, or in a cloud.
The following placeholders are used in this guide:
omni.company is the FQDN of the Omni installation.authentik.company is the FQDN of the authentik installation.:::info This documentation lists only the settings that you need to change from their default values. Be aware that any changes other than those explicitly mentioned in this guide could cause issues accessing your application. :::
To support the integration of Omni with authentik, you need to create a property mapping and application/provider pair in authentik.
Choose a Property Mapping type: Select SAML Provider Property Mapping as the property mapping type.
Configure the Property Mapping:
*property_mapping_name* (e.g. Omni Mapping)http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namereturn request.user.emailApplication: provide a descriptive name, application slug, an optional group for the type of application, the policy engine mode, and optional UI settings.
Choose a Provider type: select SAML Provider as the provider type.
Configure the Provider: provide a name (or accept the auto-provided name), the authorization flow to use for this provider, and the following required configurations.
https://omni.company/saml/acsPosthttps://omni.company/saml/metadataauthentik Self-signed Certificate or generate a certificate via System > Certificatetruetrue*property_mapping_name* (e.g. Omni Mapping)*property_mapping_name* (e.g. Omni Mapping)Configure Bindings (optional): you can create a binding (policy, group, or user) to manage the listing and access to applications on a user's My applications page.
Add the following environment variables to your Omni configuration, replacing the placeholders with your authentik FQDN and the application slug from the previous section.
auth-saml-enabled=true
auth-saml-url=https://authentik.company/application/saml/<application_slug>/metadata/
To confirm that authentik is properly configured with Omni, log out and log back in via the SAML button.