- It gives centralized control for user access
- It improves security as there are fewer passwords to manage
- It can support company security policies including MFA
- It streamlines the user experience
SSO apps
Two SSO apps are created for each instance; one for sandbox and one for production. A decision needs to be made on how to provision access to each from the IdP. Typically, creating an app for each environment within the IdP where users or groups can then be assigned for access is recommended. If there are a limited number of users who need access, sharing the same IdP app for both environments may be decided.User roles
As part of SSO, customizing a user’s access by defining the list of roles each user is assigned is allowed. Configuring the access level for a user by defining custom user attributes on their profile within the identity provider (IdP) is allowed. These attributes are added as custom claims by the SSO provider when the user is authenticated. For SAML apps, this might require mapping the attribute to the claim when setting up the dashboard as an app. For OIDC apps, a set of custom claims with the right name might need to be added or created. For roles, a claim namedgr4vy_roles with one or more of the following values is supported.
administratoranalystcustomer-supportsystem-managersystem-supportuser-manager
administrator is set, all other roles are ignored, as they are all implied by this role.
If no roles are provided, then users are given the analyst role by default.
The following roles should only be assigned if the user has either the analyst or customer-support assigned
as well.
pii-viewerreport-managerreport-viewer
For more information on roles, please see the
guide.
Integrations
For SAML or OIDC integrations, the following attributes/claims from the identity provider are expected.| Name | Required | Description |
|---|---|---|
name | true | Used as the profile name |
email | true | Used as a unique identifier |
gr4vy_roles | false | Used to set permissions. If not set, this defaults to analyst |
SSO administrator restrictions
Regular administrators can normally edit all users and invite new users. To stop an SSO administrator from circumventing the identity provider, the following restrictions have been applied.- SSO administrators can not invite new users; instead, new users need to be provisioned through the SSO identity provider.
- SSO administrators can not edit user roles or merchant accounts; instead, users need to be provisioned roles (and soon merchant accounts) through the SSO identity provider.
- SSO administrators can delete users, as this is currently the only way to clean up users who no longer have access.
- SSO administrators can edit all details of regular users.