- OIDC (OpenID Connect)
- SAML 2.0 (Security Assertion Markup Language)
Table of Contents
OIDC Integration
For OIDC integration, we require the following information from your identity provider:Required Information
- Issuer URL: The URL of your identity provider’s OIDC authorization endpoint. Wellknown OIDC configuration should be available at this URL.
- Client ID: The client ID provided by your identity provider.
- Client Secret Key: The client secret provided by your identity provider.
Setup Steps
Following scopes are required for Portkey to work with OIDC:
- openid
- profile
- offline_access
General
- Create an OIDC application in your identity provider.
- Once the application is created, please note the following details:
Issuer URL
Client Id
Client Secret
- Update the above details in Portkey Control Plane in
Admin Settings > Authentication Settings > OIDC
.
Okta
- Go to
Applications
tab on Okta dashboard andcreate a new app integration
. - Select
OIDC - OpenID Connect
as the signin method. - Select Application Type as
Web
Application - On the next step, fill in the required fields. The
signin redirect URI
should be https://app.portkey.ai/v2/auth/callback and theGrant Type
should haveAuthorization code
andRefresh Token
as checked - Create Application
- After the application is created, go to the
General
section of the application. - Click on the
edit
button for the General Settings section. - Select
Either Okta or app
for theLogin initiated by
field. - Add https://app.portkey.ai/v2/auth/callback as the
initiate login URI
- Go to the
Sign On
section and click onEdit
. SelectOkta Url
as theissuer
and save the updated details - Once everything is setup please note the following details
Issuer URL
will be theIssuer
from above stepClient Id
would be same asAudience
/Client ID
Client Secret
is needed for Web App based flow. It can be found underGeneral > Client Credentials > Client Secrets
in your Okta App.
- Update the above details in Portkey Control Plane in
Admin Settings > Authentication Settings > OIDC
Azure AD
- Sign in to the Azure portal.
- Search for and select Azure Active Directory.
- Under Manage, select App registrations.
- Select New registration.
- Enter a name.
- Select one of the Supported account types that best reflects your organization requirements.
- Under
Redirect URI
,- Select
Web
as the platform - Enter https://app.portkey.ai/v2/auth/callback as redirect url
- Select
- Click on Register
- Once saved, go to
Certificates & secrets
- Click on
Client Secrets
- Click on
New client secret
- Use appropriate settings according to your organisation
- Click on
Add
- Click on
- Once everything is set up. Please go to
Overview
- Click on
Endpoints
and note theOpenID Connect metadata document
url - Please note the
Application (client) ID
fromEssentials
- Please note the
Client Secret
fromCertificates & secrets
- Click on
- Update the above details in Portkey Control Plane in
Admin Settings > Authentication Settings > OIDC
SAML Integration
For SAML integration, we require the following information from your identity provider:Required Information
Either of the following information is required:- Provider Metadata URL: The URL from your identity provider containing the metadata, including SAML configuration details.
- Provider Metadata XML: The XML metadata of your identity provider.
Setup Steps
General
- Create an SAML application in your identity provider.
- Once the application is created, please note the following details:
Provider Metadata URL
Provider Metadata XML
- Update the above details in Portkey Control Plane in
Admin Settings > Authentication Settings > SAML
.
Okta
- Go to
Applications
tab on okta dashboard andcreate a new app integration
. - Select
SAML 2.0
as the signin method. - In
Configure SAML
, updateSingle sign-on URL
with Saml redirect url. You can find the Saml redirect url from theAdmin Settings > Authentication Settings > SAML Redirect/Consumer Service URL
from Portkey Control Plane.Audience URI (SP Entity ID)
with SAML Entity ID from Portkey Control Plane.
- Create Application
- Once everything is set up, please note the following details
Sign On tab > SAML 2.0 tab > Metadata details > Metadata URL
- Update the above details in Portkey Control Plane in
Admin Settings > Authentication Settings > SAML
Azure AD
- Sign in to the Azure portal.
- Search for and select Azure Active Directory.
- Under Manage, select App registrations.
- Select New registration.
- Enter a name.
- Select one of the Supported account types that best reflects your organization requirements.
- Under
Redirect URI
,- Select
Web
as the platform - Enter the
SAML Redirect/Consumer Service URL
from Portkey Control Plane as redirect url
- Select
- Select
Register
. - Select
Endpoints
at the top of the page. - Find the
Federation metadata document URL
and select the copy icon. - In the left side panel, select
Expose an API
. - To the right of
Application ID URI
, selectAdd
.- Enter
SAML Entity ID
from Portkey Control Plane as theApp ID URI
.
- Enter
- Select
Save
. - Once everything is set up, please note the following details
- Copy the
Federation metadata document URL
and paste it in Portkey Control Plane inAdmin Settings > Authentication Settings > SAML > Provider Metadata URL
- Copy the