You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
copy and formatting edits. Ideally, it'd be awesome to put the code block in the table, but not sure of a clean way to do it given the limitations of markdown.
Copy file name to clipboardExpand all lines: docs/programs/sso-jit.md
+12-33Lines changed: 12 additions & 33 deletions
Original file line number
Diff line number
Diff line change
@@ -8,41 +8,22 @@ HackerOne offers Just-in-time (JIT) provisioning with [SSO via SAML](single-sign
8
8
9
9
When SSO via SAML has been set up, each time a new user from your organization logs in to HackerOne, their account will automatically be created. There are 2 types of provisioning that are associated in the creation of each account: Attribute Provisioning and Program Membership.
10
10
11
-
### Attribute Provisioning
11
+
Provisioning Type | Details
12
+
----------------- | --------
13
+
Attribute Provisioning | By default, all accounts will be provisioned with and keep up-to-date these attributes: <li>First Name <li>Last name
14
+
Program Membership | All SAML users have access to the platform by default, but don't necessarily have access to programs. The options for program membership can be set to: None, Basic or Advanced. See below to learn more about these options.
12
15
13
-
By default, all accounts will be provisioned with and keep up to date the following attributes:
14
-
- First name
15
-
- Last name
16
+
### Program Membership Options
17
+
You can configure your program membership options to None, Basic or Advanced. Each option enables the user different permissions.
16
18
17
-
### Program Membership
19
+
Option Type | Details
20
+
----------- | -------
21
+
None | You can invite users to your program and manage their membership and permission level within the user management interface.
22
+
Basic | Enables any user attached to your SAML configuration to join the program automatically without an invitation at login. This works for multiple programs if your SAML settings are attached to all programs. <br><br>To configure this provisioning, contact support@hackerone.com after your SAML configuration is enabled and HackerOne will turn it on for you.
23
+
Advanced | Enables organizations to control membership and permission level from their SSO provider. When configured, the attributes for the users membership and group will be used to assign the user to your program and the appropriate group in HackerOne with the associated permissions. You can confirm the memberships are being added properly by viewing your program [audit log](audit-logs.html).<br><br>To configure this provisioning, HackerOne needs to establish a mapping between the SSO provider (your system) and the HackerOne system. HackerOne does this by utilizing the attribute statements on the SSO provider side, which you will point to groups defined in your HackerOne program. <br><br>The assertion should provide an attribute with the following name: `Program.<handle>.groups` and the value should be a semi-colon delimited list of the program Group names the user should belong to. If no groups are specified the user will not be added to the program. <br><br> Take, for example, this set of configured Groups in HackerOne:<br><br>  <br><br>A correlating SSO configuration (for Okta) would look like this: <br><br>
18
24
19
-
All SAML users have access to the platform by default, but do not necessarily have access to programs. This will help you understand the options that are available to you when configuring your SAML settings.
25
+
HackerOne can confirm the mapping between the SSO provider and HackerOne is done correctly by inspecting the assertion statement in the SAML Response:
20
26
21
-
#### None
22
-
23
-
Without any program membership provisioning, you can invite users to your program and manage their membership and permission level within the user management interface.
24
-
25
-
#### Basic
26
-
27
-
The basic configuration allows any user attached to your SAML configuration to join the program automatically without an invitation at login. This works for multiple programs if your SAML settings are attached to all programs.
28
-
29
-
To configure this provisioning, contact support@hackerone.com after your SAML configuration is enabled and we will turn it on for you.
30
-
31
-
#### Advanced
32
-
33
-
The advanced configuration allows organizations to control membership and permission level from their SSO provider. When configured, the attributes for the users membership and group will be used to assign the user to your program and the appropriate group in HackerOne with the associated permissions.
34
-
35
-
To configure this provisioning we need to establish a mapping between the SSO provider (your system) and the HackerOne system. We do this by utilizing the attribute statements on the SSO provider side, which you will point to groups defined in your HackerOne program.
36
-
37
-
The assertion should provide an attribute with the following name: `Program.<handle>.groups` and the value should be a semi-colon delimited list of the program Group names the user should belong to. If no groups are specified the user will not be added to the program.
38
-
39
-
Take, for example, this set of configured Groups in HackerOne:
40
-

41
-
42
-
A correlating SSO configuration (for Okta) would look like this:
43
-

44
-
45
-
We can confirm the mapping is done correctly by inspecting the assertion statement in the SAML Response:
0 commit comments