Capella UI Authentication
Couchbase Capella supports federated authentication with Single Sign-On (SSO) and Multi-Factor Authentication (MFA) for the Capella UI.
Couchbase Capella offers the following options for Capella UI authentication.
Federated & SSO Authentication
Couchbase Capella allows users to sign in to the Capella UI using federated and SSO authentication after configuring Capella to authenticate using data passed from your identity provider (IdP). Okta, Azure AD, Ping Identity, and CyberArk are supported IdPs.
By fitting into your company’s existing security infrastructure, federated and SSO powered by an IdP has the following advantages:
Your company’s IdP manages Capella users—not Couchbase. Your administrators can onboard, offboard, and manage Capella users with existing workflows.
All supported IdPs provide their own built-in multi-factor authentication (MFA).
Your users can use Capella without needing to remember another username and password.
To configure federated and SSO authentication, you need the following:
- Identity Provider (IdP)
Capella supports the following IdPs:
Capella manages and configures the link with your IdP with a realm. Each organization supports one realm.
Only users with the
Organization Ownerrole can create, manage, and view realms.
Map user groups from your IdP to permission sets in Capella with a team. Capella creates a default team, called "My First Team," with no pre-existing role-mapping when you create a realm. Each organization can support multiple teams. You can assign users to one or more teams.
Only users with the
Organization Ownerrole can create and manage teams. Every user in an organization can view team information.
When you add federated and SSO authentication to an organization:
Capella turns off Capella MFA for all SSO users in the organization who can then use the MFA provided by the IdP. Non-SSO users can continue to use the Capella MFA.
SSO Users within the organization can’t change their name, email or set a password.
Capella adds each SSO user to the default team ("My First Team") as they sign in, unless you specify another default team or create IdP group mappings. You can’t delete a realm’s configured default team.
If a realm has group mapping turned off, Capella uses the default team to initially assign SSO users their roles. After SSO users sign in, you can manage their organization roles using the People tab and manage project access using each project’s Collaborators tab.
Multi-Factor Authentication (MFA)
Any non-SSO user within your organization can use Capella’s MFA. MFA improves your Capella account security by requiring two credentials to sign in: your password and a time-based one-time password (TOTP).
To turn on MFA for your account, see Manage Multi-Factor Authentication (MFA).