Configuring a Global Identity Provider
Integrating with an Identity Provider enables single sign on and auto-assignment for Access Reviews.
For organizations with many users and access reviewers, enabling a global Identity Provider (IdP) eliminates the need to manually specify additional reviewers by email, or create additional Veza user accounts for reviewers. When enabled:
Administrators and Operators can create reviews and assign reviews for any IdP user in a domain.
Any IdP user able to log in to Veza with single sign-on (SSO) can authenticate without the need to provision an account beforehand. See Sign-In Settings to enable SSO.
Entity Owners and Resource Manager Tags can be auto-assigned as reviewers.
Alternate Manager Lookup can be used to assign reviews when you have multiple sources of employee records (e.g., contractors in one system, managers in another).
Typically, your Veza deployment engineer will perform initial IdP settings configuration during onboarding. If further assistance is needed, Veza Support can help through a support ticket.
Administrators with API access can also make these calls directly using endpoints in the private/
namespace. See the following sections for prerequisites and API request format.
Before you start
The authorization graph must contain entities for an integrated provider data source. See the integration guides for:
Use Query Builder to search for a user from your identity provider, and retrieve the provider's
datasource_id
.Single Sign-On must be enabled to allow external users to log in to Veza.
You must retrieve the correct
auth_provider_id
for your SSO provider (see instructions below).
Retrieving the auth_provider_id
Important: The auth_provider_id
in your IdP settings must match the id
field from /api/private/auth_providers
for your SSO provider type. Using a mismatched auth provider ID will cause duplicate users to appear in Access Reviews—both the local user and the graph user will be shown when only the graph user should appear.
Your Veza support representative can help retrieve the auth_provider_id
. Alternatively, you can retrieve it directly with the following API calls:
GET /api/private/auth_providers
This will return a list of all configured authentication providers. To find the correct value:
Identify which authentication provider your users use to log in to Veza:
If using SAML: Find the entry with
"auth_provider_type": "SAML_AUTH_PROVIDER"
and"enabled": true
If using OIDC: Find the entry with
"auth_provider_type": "SSO_AUTH_PROVIDER"
,"auth_provider_implementation": "OIDC"
, and"enabled": true
Use the
id
field from that entry as yourauth_provider_id
Example response excerpt for a SAML provider:
{
"auth_providers": [
{
"id": "2017389d-a2e1-4849-a596-c1a1bd308fbc",
"auth_provider_type": "SAML_AUTH_PROVIDER",
"enabled": true,
"name": "SAML SSO"
}
]
}
In this example, the auth_provider_id
would be 2017389d-a2e1-4849-a596-c1a1bd308fbc
.
You can also check the current Global IdP settings:
GET /api/private/workflows/access/global_settings/idp_settings
Note: These endpoints require an administrator API key to access.
For detailed API endpoint documentation including request examples, see alternate-manager-lookup.md.
Update global identity provider settings request
PUT /api/private/workflows/access/global_settings/idp_settings
Enable Veza to suggest reviewers from the graph by specifying the SSO auth_provider_id
and identity provider data source instance_id
:
{
"value": {
"enabled": true,
"idp": {
"auth_provider_id": "cf9bab40-4e48-4afc-a310-acfdad416233",
"user_type": "OktaUser",
"instance_id": "dev-5150036.okta.com",
"user_identity_property": "idp_unique_id",
"instance_id_property": "datasource_id",
"manager_identity_property": "manager_idp_unique_id"
}
}
}
enabled
Set true
to enable the provider as a Global IdP.
auth_provider_id
Internal UID for the single sign-on provider instance. This must match the id
field from /api/private/auth_providers
for your SSO provider type.
user_type
Graph entity type to search for users, such as CustomIDPUser
or OktaUser
.
instance_id
The UID for a provider in the data catalog.
user_identity_property
Unique entity property used to identify the IdP, typically idp_unique_id
.
instance_id_property
The user entity property used to identify the IdP instance (e.g. instance_id
).
manager_identity_property
The user entity property used to identify the manager.
active_user_conditions
Filter string for identifying inactive users e.g. {"fn": "EQ", "property": "is_active", "value": true}
`user_identity_property` should be a globally unique value. Setting this to a name or email should be avoided as a best practice.
Notes:
auth_provider_id
identifies users with entries in the local user database and will also map correlated graph entities.There can be several instances of an identity provider for a given
user_type
.instance_id
ensures the user info is pulled from the correct instance and domain.Veza will populate the user list by searching for nodes of type
user_type
withinstance_id_property
equal toinstance_id
.Setting
"instance_id_property": "datasource_id"
will typically achieve the correct behavior.
Examples
Replace <AUTH_PROVIDER_ID>
with the id
value retrieved from /api/private/auth_providers
for your SSO provider.
Okta:
{
"value": {
"enabled": true,
"idp": {
"auth_provider_id": "<AUTH_PROVIDER_ID>",
"user_type": "OktaUser",
"instance_id": "dev-5150036.okta.com",
"user_identity_property": "idp_unique_id",
"instance_id_property": "datasource_id",
"manager_identity_property": "manager_idp_unique_id"
}
}
}
Microsoft Azure AD:
{
"value": {
"enabled": true,
"idp": {
"auth_provider_id": "<AUTH_PROVIDER_ID>",
"user_type": "AzureADUser",
"instance_id": "d5d23474-d857-4e12-bf68-75d638867e93",
"user_identity_property": "idp_unique_id",
"instance_id_property": "datasource_id",
"manager_identity_property": "manager_idp_unique_id"
}
}
}
Custom Identity Provider:
{
"value": {
"enabled": true,
"idp": {
"auth_provider_id": "<AUTH_PROVIDER_ID>",
"user_type": "CustomIDPUser",
"instance_id": "aa650cf7-2370-406e-bb35-1a8e14b92919",
"user_identity_property": "idp_unique_id",
"instance_id_property": "datasource_id",
"manager_identity_property": "manager_idp_unique_id"
}
}
}
Validating global identity provider settings
Test your configuration by creating a review and selecting reviewers:
Expected behavior when configured correctly:
Identities from the graph appear in reviewer suggestions (validates
user_type
,instance_id
,instance_id_property
)Each SSO user appears only once as their graph entity (validates
auth_provider_id
)
If you see duplicate users (both local user and graph user for the same person):
The
auth_provider_id
does not match your SSO provider's IDRetrieve the correct value from
/api/private/auth_providers
and update your configuration
Last updated
Was this helpful?