Set Up Capella SSO Using CyberArk
- Capella Operational
- how-to
Configure Single Sign-On (SSO) between CyberArk and Couchbase Capella to allow your organization’s users to authenticate securely without managing separate credentials. This integration enables streamlined access management while maintaining enterprise-grade security.
Prerequisites
To configure CyberArk as an IdP, you need:
-
To enable SSO for your Capella organization.
-
A CyberArk account.
-
To sign in to the CyberArk Admin Portal as an admin.
Procedure
Choose the tab for your preferred authentication protocol.
-
SAML
-
OIDC
To configure federated and SSO authentication using SAML with CyberArk as your identity provider (IdP), you must complete three procedures in the following order:
Start by creating a CyberArk web application in the CyberArk Admin Portal. You need information from this step to create a realm in Capella.
-
In the CyberArk Admin Portal, click
. -
Create the web application:
-
Click Add Web Apps.
-
Click the Custom tab.
-
In the list of templates, find the SAML option and click Add.
-
To add this application, click Yes.
-
Exit the Add Web Apps dialog by clicking Close.
You now see the Settings page for the SAML app.
-
Fill in the following fields:
-
Name: Enter a meaningful name.
-
(Optional) Description: Add a description of the application.
-
(Optional) Logo: Add the Capella logo.
-
-
Click Save.
-
-
Start the SAML configuration:
-
Click SAML Response:
-
Use the Add button to add the following attributes:
After adding an attribute, you can show the Add button again by clearing the checkbox. Attributes Name Attribute Value email
LoginUser.Email
given_name
LoginUser.FirstName
family_name
LoginUser.LastName
groups
LoginUser.RoleNames
-
Click Save.
-
-
Assign your admin account with permissions to the app:
-
Click Permissions.
-
Click Add.
-
Using the search field, find and add your admin account.
-
Grant your admin account the following permissions:
-
Grant
-
View
-
Manage
-
Delete
-
Run
-
Automatically Deploy
-
-
Click Save.
Your web app status shows as Deployed.
-
-
Click the Trust tab.
You need information from this page to create a realm in Capella.
With a CyberArk web application created, you need to create a realm in Capella using information from CyberArk.
-
In the Capella UI, click
. -
Click
. -
Complete the Create Realm page:
-
Copy the following information from your CyberArk configuration to Capella:
To find this information in the CyberArk Admin Portal, go to . Find and open the web application that you want to view. Click Trust.CyberArk Field Capella Field Contents of
SAML Signing Certificate
Single Sign-On URL
Sign-in Endpoint URL
-
Verify that the remaining SAML protocol settings are as follows:
Field Value Signature Algorithm
RSA-SHA256
Digest Algorithm
SHA256
SAML Protocol Binding
HTTP-POST
-
Choose a default team.
Capella automatically assigns users to the chosen default team when they do not match any team based on their SSO groups. All users assigned to the default team have its chosen permission set.
For more information, see Map User Roles.
-
Choose to turn on or off group mapping.
Group mapping allows you to assign roles to SSO users based on which teams map to their SSO group.
If you do not use group mapping, Capella uses the default team to give SSO users their roles when they first sign in. Without group mapping, you must manage your users' organization roles using the People tab and project roles using each project’s Collaborators tab.
-
-
Click Create Realm.
Capella creates the new realm with an auto-generated name.
Users need to know the realm name to sign in with SSO. You can change the a realm name after you create the realm. For more information, see Change the Realm Name.
Now that you have created the realm, you must finish configuring the CyberArk web application.
-
In the CyberArk Portal, open the application you created for Capella.
-
Click Trust.
-
At the end of the page, edit the Service Provider Configuration settings:
-
Select Manual Configuration.
-
Copy the following fields from your Capella realm configuration to the CyberArk configuration:
To find this information for your organization’s Capella realm, open the page. On this page is the realm you just created with an auto-generated name. Click its listing to open the realm information page.Capella Field CyberArk Field Callback URL
Assertion Consumer Service (ACS) URL
Entity ID
SP Entity ID / Issuer / Audience
-
-
Click Save.
-
Assign users to the application.
-
Click Permissions.
-
Add the groups whose members need access to Couchbase Capella. See the Deploy applications page of the CyberArk documentation for more detail.
-
To configure federated and SSO authentication using CyberArk as your identity provider (IdP), you must complete three procedures in the following order:
Start by creating a CyberArk web application in the CyberArk Admin Portal. You need the information from this step to create a realm in Capella.
-
In the CyberArk Admin Portal, click
. -
Click Add Web Apps.
-
Click the Custom tab.
-
In the list of templates, find and add OpenID Connect.
-
Configure the basic settings:
-
Name: Add a unique application name.
-
(Optional) Description: Add a description of the application.
-
(Optional) Logo: Add the Capella logo.
-
-
Click Save.
-
Assign your admin account with permissions to the app:
-
Click Permissions.
-
Click Add.
-
Using the search field, find and add your admin account.
-
Grant your admin account the following permissions:
-
Grant
-
View
-
Manage
-
Delete
-
Run
-
Automatically Deploy
-
-
Click Save.
Your web app status shows as Deployed.
-
-
Click Trust.
You need information from this page to create a realm in Capella.
With the web application created in CyberArk, you need to create a realm in Capella using its information.
-
In Capella, click
. -
Click
. -
Copy the following information from your CyberArk web application configuration to Capella:
To find this information in the CyberArk Admin Portal, go to . Find and open the web application that you want to view. Click Trust.CyberArk Field Capella Field OpenID Connect Metadata URL
OpenID Connect Discovery URL
OpenID Connect Client ID
Client ID
OpenID Connect Client Secret
Client Secret
-
Configure scopes:
Scopes determine which user information Capella requests from your identity provider. The
openid
,email
, andprofile
scopes are automatically included in the realm by default, so you do not need to add them.When adding additional scopes, separate each entry with a space.
-
Configure a default team and group mapping.
-
Choose a default team.
Capella automatically assigns users to the chosen default team when they do not match any team based on their SSO groups. All users assigned to the default team have its chosen permission set.
For more information, see Map User Roles.
-
Choose to turn on or off group mapping.
Group mapping allows you to assign roles to SSO users based on which teams map to their SSO group.
If you do not use group mapping, Capella uses the default team to give SSO users their roles when they first sign in. Without group mapping, you must manage your users' organization roles using the People tab and project roles using each project’s Collaborators tab.
-
-
Click Create Realm.
Capella creates the new realm with an auto-generated name.
Users need to know the realm name to sign in with SSO. You can change the a realm name after you create the realm. For more information, see Change the Realm Name.
Now that you have created the realm, you must finish configuring the CyberArk web application.
-
In the CyberArk Portal, open the application you created for Capella.
-
Click Trust.
-
Edit the following field with information from your Capella realm.
To find this information for your organization’s Capella realm, open the page. On this page is the realm you just created with an auto-generated name. Click its listing to open the realm information page.Capella Field CyberArk Field Callback URL
Authorized Redirect URIs
-
Click Save.
For more information about adding a custom OpenID Connect application, see the CyberArk documentation.