Back to Tuist

Single Sign-On {#single-sign-on}

server/priv/docs/en/guides/integrations/authentication/sso.md

4.191.83.2 KB
Original Source

Single Sign-On {#single-sign-on}

Tuist offers Single Sign-On (SSO) as a login option to provide additional account security for your organization.

SSO is configured from the Authentication tab in your organization settings. Google and Okta are supported as identity providers.

[!NOTE] SSO controls how members sign in. <.localized_link href="/guides/integrations/authentication/scim">SCIM provisioning</.localized_link> controls whether an identity provider can create, update, and deprovision organization members automatically. For Okta, most organizations configure both.

Google {#google}

Google SSO allows any developer who signs in with a Google Workspace account from your domain to be automatically added to your Tuist organization.

[!NOTE] Prerequisites

You need a Google Workspace organization with a verified domain. You must also be authenticated with Google using an email tied to the domain you are setting up.

Setup {#google-setup}

  1. Navigate to your organization's Authentication settings tab.
  2. Enable SSO using the toggle.
  3. Select Google as the provider.
  4. Enter your Google Workspace domain (e.g., example.com).
  5. Click Save changes.

Okta {#okta}

Okta SSO uses the OIDC protocol to allow members of your Okta organization to sign in to Tuist.

If you also want Okta to create, update, or deprovision members automatically, configure <.localized_link href="/guides/integrations/authentication/scim#okta">Okta SCIM provisioning</.localized_link> after SSO is working.

Step 1: Create an Okta OIDC application {#okta-step-1}

  1. In your Okta admin dashboard, go to Applications > Applications > Create App Integration.
  2. Select OIDC - OpenID Connect and Web Application.
  3. Set the application name (e.g., Tuist). Optionally upload the Tuist logo.
  4. Set the Sign-in redirect URI to the value shown on the Authentication settings page (e.g., https://tuist.dev/users/auth/okta/callback).
  5. Under Assignments, choose the desired access control and save.
  6. Copy the Client ID and Client Secret from the application's general settings. Note your Okta domain (e.g., your-company.okta.com).
  7. Optionally, to allow login from the Okta dashboard, click Edit on General Settings, change Login initiated by to Either Okta or App, select Display application icon to users, and set the Initiate login URI to the value shown on the Authentication settings page (e.g., https://tuist.dev/users/auth/okta?organization_id=YOUR_ORG_ID).

Step 2: Configure Tuist {#okta-step-2}

  1. Navigate to your organization's Authentication settings tab.
  2. Enable Single Sign-On using the toggle.
  3. Select Okta as the provider.
  4. Enter your Okta domain, Client ID, and Client Secret.
  5. Click Save changes.

Step 3: Assign users to the Okta application {#okta-step-3}

Assign the users or groups that should be allowed to sign in to the Okta OIDC application.

If the same users are also provisioned through SCIM, Tuist links the Okta identity to the existing Tuist user the first time the user signs in through Okta with the same email address.