Set Up Capella SSO Using OneLogin
- Capella Operational
- how-to
Configure Single Sign-On (SSO) between OneLogin and Couchbase Capella to allow your organization’s users to authenticate securely without managing separate credentials. This integration enables streamlined access management while maintaining enterprise-grade security.
Prerequisites
To configure OneLogin as an IdP, you need:
-
To enable SSO for your Capella organization.
-
A OneLogin account.
-
To sign in to the OneLogin Admin panel as an Account Owner.
Procedure
Choose the tab for your preferred authentication protocol.
-
SAML
-
OIDC
To configure federated and SSO authentication using SAML with OneLogin as your identity provider (IdP), you must complete three procedures in the following order:
Start by adding an application for Capella in the OneLogin Admin panel. You need information from this step to create a realm in Capella.
-
In the OneLogin Admin panel, click
. -
Create the application:
-
Click Add App.
-
In the search field, type
SAML
and press Enter. -
From the
templates
list, find and click SAML Test Connector (IdP). -
Complete the following fields:
-
Display Name: Enter a meaningful display name.
-
(Optional) Rectangular Icon / Square Icon: Add the Capella logo.
-
(Optional) Description: Add a description of the application.
-
-
Click Save.
-
-
In the navigation pane, click SSO.
-
In the X.509 Certificate section, click View Details.
-
Select SHA256 as the SHA fingerprint.
-
Copy the X.509 Certificate.
-
Click Save.
With the application created in OneLogin, you need to create a realm in Capella using information from OneLogin.
-
In the Capella UI, click
. -
Click
. -
Complete the Create Realm page:
-
Copy the following information from your OneLogin configuration to Capella:
All this information is in the SSO section of the OneLogin Admin panel when configuring your application. OneLogin Field Capella Field X.509 Certificate
SAML Signing Certificate
SAML 2.0 Endpoint (HTTP)
Sign-in Endpoint URL
-
Verify that the remaining SAML protocol settings are as follows:
Field Value Signature Algorithm
RSA-SHA256
Digest Algorithm
SHA256
SAML Protocol Binding
HTTP-POST
-
Choose a default team.
Capella automatically assigns users to the chosen default team when they do not match any team based on their SSO groups. All users assigned to the default team have its chosen permission set.
For more information, see Map User Roles.
-
Choose to turn on or off group mapping.
Group mapping allows you to assign roles to SSO users based on which teams map to their SSO group.
If you do not use group mapping, Capella uses the default team to give SSO users their roles when they first sign in. Without group mapping, you must manage your users' organization roles using the People tab and project roles using each project’s Collaborators tab.
-
-
Click Create Realm.
Capella creates the new realm with an auto-generated name.
Users need to know the realm name to sign in with SSO. You can change the a realm name after you create the realm. For more information, see Change the Realm Name.
Now that you have created the realm, you must finish configuring the OneLogin application.
-
In OneLogin, click Configuration.
-
Copy the following fields from your Capella realm configuration to the OneLogin configuration:
To find this information for your organization’s Capella realm, open the page. Listed on this page is the realm you just created with an auto-generated name. Click its listing to open the realm information page.Capella Field OneLogin Fields Callback URL
-
ACS (Consumer) URL Validator
-
ACS (Consumer) URL
Entity ID
-
Audience
-
-
In OneLogin, click Save.
-
Add the parameters:
-
In OneLogin, with the application open, click Parameters.
-
Click + to add each of the following attributes:
Field name Flags Value given_name
Include in SAML assertion
First Name
family_name
Include in SAML assertion
Last Name
email
Include in SAML assertion
Email
groups
Include in SAML assertion
User Roles
-
-
Click Save.
-
Assign users to the application or add the application to a role.
For more information, see the Roles and App Management pages of the OneLogin documentation.
To configure federated and SSO authentication using OIDC with OneLogin as your identity provider (IdP), you must complete three procedures in the following order:
Start by adding an application for Capella in the OneLogin Admin panel. You need information from this step to create a realm in Capella.
-
In the OneLogin Admin panel, click
. -
Click Add App and search for
oidc
. -
Find and click OpenId Connect (OIDC).
-
Complete the following fields:
-
Display Name: Enter the display name for this app.
-
(Optional) Rectangular Icon / Square Icon: Add the Capella logo.
-
(Optional) Description: Add a description of the application.
-
-
Click Save.
With the application created in OneLogin, you need to create a realm in Capella using information from OneLogin.
-
In Capella, click
. -
Click
. -
Copy the following information from your OneLogin configuration to Capella:
All this information is in the SSO section of the OneLogin Admin panel when configuring your application. OneLogin Field Capella Field Issuer URL
OpenID Connect Discovery URL
Client ID
Client ID
Client Secret
Client Secret
-
Configure scopes:
Scopes determine which user information Capella requests from your identity provider. The
openid
,email
, andprofile
scopes are automatically included in the realm by default, so you do not need to add them.When adding additional scopes, separate each entry with a space.
-
Configure a default team and group mapping.
-
Choose a default team.
Capella automatically assigns users to the chosen default team when they do not match any team based on their SSO groups. All users assigned to the default team have its chosen permission set.
For more information, see Map User Roles.
-
Choose to turn on or off group mapping.
Group mapping allows you to assign roles to SSO users based on which teams map to their SSO group.
If you do not use group mapping, Capella uses the default team to give SSO users their roles when they first sign in. Without group mapping, you must manage your users' organization roles using the People tab and project roles using each project’s Collaborators tab.
-
-
Click Create Realm.
Capella creates the new realm with an auto-generated name.
Users need to know the realm name to sign in with SSO. You can change the a realm name after you create the realm. For more information, see Change the Realm Name.
Now that you have created the realm, you must finish configuring the OneLogin application.
-
In OneLogin, click Configuration and view the Application details.
-
Copy information from your Capella realm configuration to the OneLogin configuration:
To find this information for your organization’s Capella realm, open the page. Listed on this page is the realm you just created with an auto-generated name. Click its listing to open the realm information page.Capella Field OneLogin Fields Callback URL
Redirect URI’s
-
Click Save.
-
In the OneLogin Admin panel, click SSO.
-
Change the Token Endpoint Authentication Method to
POST
. -
Click Save.
-
Assign users to the application or add the application to a role.
For more information, see the Roles and App Management pages of the OneLogin documentation.