This information only applies to organizations on the Pro and Enterprise plans.
Buf's SSO integration supports the following SAML features:
- Identity Provider (IdP)- initiated SSO
- Service Provider (SP)- initiated SSO
- Just-in-Time (JIT) user provisioning
The steps below must be carried out by an Okta admininstrator for your organization.
Prerequisites
- Setup (Pro | Enterprise) needs to be complete. You need to know your private
BSR server domain (for example,
example.buf.dev
orbuf.example.com
) for the steps below.
Set up application
- Sign in to your Okta organization.
- Navigate to Applications > Applications and click Create App Integration.
- For Sign-in method, select OIDC - OpenID Connect.
- For Application type, select Web Application.
Configure OIDC
-
Under General Settings, give the integration an App name like "Buf Schema Registry" or "Buf". This should be something meaningful to your users.
-
Under Grant type, make sure to check Refresh Token.
-
Next, provide the callback URL. This will depend on the domain you provided.
- Sign-in redirect URIs will be
https://buf.example.com/oauth2/callback
- Sign-out redirect URIs will be
https://buf.example.com/logout
Support for logout will be available in an upcoming release, but we suggest configuring this now so it works seamlessly when enabled. If you require Application Single Logout, contact Support or your Buf representative.
Note that Buf provisions users Just-in-Time based on the email address.
- Sign-in redirect URIs will be
-
In the Assignments section, select which users or groups of users should have access to this Buf instance.
Once you've created the Okta application, contact Support or your Buf representative and let us know the following items:
- Client ID
- Client secret
- Okta domain