Manage Groups with SSO
Manage your CloudZero user groups by enabling your single-sign on (SSO) identity provider (IdP) to automatically assign users to existing, manually-created groups.
After creating one or more user groups and setting up your SSO integration in CloudZero, you can enable the SSO for Groups setting. CloudZero will look for existing user groups with a matching name and then sync the appropriate users to those groups. Any groups without a matching name will be ignored.
How to Enable SSO for Groups
You can enable SSO for groups by following the steps for your IdP:
Okta
Note that you must manually create one or more user groups in CloudZero before you can enable SSO for groups.
To enable SSO for groups using an Okta integration, you must take the following steps:
- Add a claim to the Okta Authorization Server.
- Add a claim to the CloudZero-specific application in Okta.
- Enable SSO for groups in CloudZero.
Step 1: Add Claim to Okta Authorization Server
-
In Okta, navigate to Security > API > Authorization Servers and select the appropriate authorization server. This is usually the default server.
-
Select Claims > Add Claim.
-
Enter a Name (for example,
groups
). -
In the Include in token type field, select ID Token, and in the second dropdown, select Userinfo/id_token request.
-
Set Value type to Groups.
-
In the Filter field, set the filter predicate drop-down menu to your choice of predicate (for example, Matches regex).
-
Set the filter value to your choice of value (for example,
.*
to match all CloudZero groups). Ensure this matches the name of the groups your users are in. -
Set the Include in field to Any scope.
-
Select Save.
You should then see the claim in the claims table for your authorization server:
Step 2: Add Claim to CloudZero Application in Okta
-
In Okta, navigate to Admin Console > Applications > Applications.
-
Select your CloudZero application.
-
In the Sign On tab, scroll down to the OpenID Connect ID Token and select Edit.
-
In the Groups claim filter section, set the first drop-down menu to groups.
-
Set the second drop-down menu to your choice of filter predicate (for example, Matches regex).
-
Set the filter value field to your choice of value (for example,
.*
to match all CloudZero groups). Ensure this matches the name of the groups your users are in. -
Select Save.
Step 3: Enable SSO for Groups in CloudZero
-
In CloudZero, navigate to Settings > SSO Integrations and select your Okta integration:
-
Scroll down to the SSO Connection Status and Controls section and check the Enable SSO for Groups box:
-
Select the Enable button.
Microsoft Entra ID (Azure AD)
Note that you must manually create one or more user groups in CloudZero before you can enable SSO for groups.
To enable SSO for groups using a Microsoft Entra ID (Azure Active Directory) integration:
-
In CloudZero, navigate to Settings > SSO Integrations and select your Microsoft Entra ID (Azure AD) integration:
-
Scroll down to the SSO Connection Status and Controls section and check the Enable SSO for Groups box:
-
Select the Enable button.
OpenID Connect (including GCP)
The groups claim is often a new scope in your OpenID Connect (OIDC) IdP. Currently, none of CloudZero's existing OIDC integrations ask for this claim.
Note that you must manually create one or more user groups in CloudZero before you can enable SSO for groups.
In order to send CloudZero the groups claim and enable your OIDC IdP to manage your existing groups in CloudZero:
-
In CloudZero, navigate to Settings > SSO Integrations and select your OIDC integration.
-
Scroll down to the SSO Connection Status and Controls section and check the Enable SSO for Groups box.
-
Select the Enable button.
Updated 5 days ago