Skip to content
Merged
Show file tree
Hide file tree
Changes from 2 commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
12 changes: 4 additions & 8 deletions content/operate/rc/security/access-control/saml-sso/_index.md
Original file line number Diff line number Diff line change
Expand Up @@ -44,7 +44,7 @@ You can also initiate single sign-on from the [Redis Cloud console](https://clou

1. From the Redis Cloud console's [sign-in screen](https://cloud.redis.io/#/login), select **SSO**.

{{<image filename="images/rc/button-sign-in-sso.png" width="150px" alt="Sign in with SSO button">}}
{{<image filename="images/rc/button-sign-in-sso.png" width="50px" alt="Sign in with SSO button">}}

1. Enter the email address associated with your SAML user account.

Expand Down Expand Up @@ -100,7 +100,7 @@ Before you set up SAML SSO in Redis Cloud, you must verify that you own the doma

{{<image filename="images/rc/saml-button-add-domain.png" width="120px" alt="Add domain button">}}

1. Enter the domain name and select {{<image filename="images/rc/saml-button-confirm.png#no-click" width="20px" alt="The confirm domain button" class="inline">}} to save it, or select {{<image filename="images/rc/saml-button-cancel.png#no-click" width="20px" alt="The cancel button" class="inline">}} to cancel.
1. Enter the domain name and select {{<image filename="images/rc/saml-button-confirm.png#no-click" width="20px" alt="Confirm domain" class="inline">}} to save it, or select {{<image filename="images/rc/saml-button-cancel.png#no-click" width="20px" alt="Cancel" class="inline">}} to cancel.

{{<image filename="images/rc/saml-enter-domain.png" width="80%" alt="Enter domain name in the Domain field.">}}

Expand All @@ -110,12 +110,10 @@ Before you set up SAML SSO in Redis Cloud, you must verify that you own the doma

We'll check the domain's DNS records for the provided TXT record. If the TXT record does not exist or we can't resolve your domain, we won't be able to verify the domain and users with that domain won't be able to sign in using SAML SSO.

Select {{<image filename="images/rc/saml-button-delete-domain.png#no-click" width="25px" alt="The delete domain button" class="inline">}} to delete a domain if it was added by mistake.
Select {{<image filename="images/rc/saml-button-delete-domain.png#no-click" width="25px" alt="delete domain" class="inline">}} to delete a domain if it was added by mistake.

If we find the TXT record, the domain's status will change to **Verified**.

{{<image filename="images/rc/saml-domain-verified.png" width="80%" alt="The Manage domain bindings panel, with a verified domain">}}

You can select **Add domain** to add another domain.

1. Select **Close** to close the domain binding panel.
Expand Down Expand Up @@ -300,12 +298,10 @@ To see and interact with the Redis Cloud account in the **Unlinked accounts** li

1. Select **Link account**.

{{<image filename="images/rc/saml/button-saml-link-account.png" alt="The Link Account button">}}
{{<image filename="images/rc/saml/button-saml-link-account.png" alt="The Link Account button" width=150px >}}

1. In the **Convert existing users** dialog, select **Confirm conversion** to finish linking the accounts.

{{<image filename="images/rc/saml/popup-saml-convert-users.png" alt="The Convert users popup">}}

## Deactivate SAML SSO

Before you can deactivate SAML SSO for an account, you must sign in to the account as a local (non-SAML) user with the owner role assigned.
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -175,16 +175,14 @@ Replace `ID` so it matches the `AssertionConsumerService` Location URL ID (the c

{{<image filename="images/rc/saml/sm_saml_8.png" >}}

A popup appears, explaining that, in order to test the SAML connection, that we need to login with credentials of a user defined in Auth0.

{{<image filename="images/rc/saml/sm_saml_9.png" >}}
A popup appears, explaining that, in order to test the SAML connection, that we need to login with credentials of a user defined in Auth0. Select **Continue** to go to the Auth0 login screen.

1. The Auth0 login screen appears. Enter the credentials and select **Sign In**.

{{<image filename="images/rc/saml/auth0_saml_12.png" >}}

1. If the test has succeeded, you will see the the Redis Cloud console screen. Your local account is now considered a SAML account. To log in to the Redis Cloud console from now on, click on **Sign in with SSO**.
If everything is configured correctly, you will see the the Redis Cloud console screen. Your local account is now considered a SAML account.

1. Enter your SAML email and select **Login**.
To log in to the Redis Cloud console from now on, click on **Sign in with SSO**.

You have successfully configured SAML as an identification provider.
{{<image filename="images/rc/button-sign-in-sso.png" width="50px" alt="Sign in with SSO button">}}
Original file line number Diff line number Diff line change
Expand Up @@ -138,18 +138,14 @@ The final step in our SAML integration with AWS IAM identity Center is to activa

{{<image filename="images/rc/saml/sm_saml_8.png" >}}

A logout notification screen displays, letting you know that you are redirected to AWS IAM Identity Center's login screen.

{{<image filename="images/rc/saml/sm_saml_9.png" >}}
A logout notification screen displays, letting you know that you will be redirected to your identity provider. Select **Continue** to go to the AWS IAM Identity Center's login screen.

1. Enter your AWS IAM Identity Center credentials.

{{<image filename="images/rc/saml/aws_iam_identity_center_saml_18.png" >}}

1. If everything is configured correctly, you should get a **SAML activation succeeded** message. From this point forward, users need to click **SSO** to sign in to the Redis Cloud console.

{{<image filename="images/rc/saml/aws_iam_identity_center_saml_19.png" >}}
If everything is configured correctly, you will see the the Redis Cloud console screen. Your local account is now considered a SAML account.

A message displays, stating that your local user is now converted to a SAML user. Select **Confirm**.
To log in to the Redis Cloud console from now on, click on **Sign in with SSO**.

You have successfully configured AWS IAM Identity Center as an identification provider.
{{<image filename="images/rc/button-sign-in-sso.png" width="50px" alt="Sign in with SSO button">}}
Original file line number Diff line number Diff line change
Expand Up @@ -163,23 +163,17 @@ Make sure the **Namespace** field is empty when modifying these claims.

{{<image filename="images/rc/saml/sm_saml_8.png" >}}

1. A popup appears, explaining that you must log in with the credentials of a Microsoft Entra user to test the SAML connection.

{{<image filename="images/rc/saml/sm_saml_9.png" >}}
1. A popup appears, explaining that you must log in with the credentials of a Microsoft Entra user to test the SAML connection. Select **Continue** to go to the Microsoft login screen.

1. The Microsoft login screen will appear. Enter the credentials and click **Sign In**.

{{<image filename="images/rc/saml/ad_saml_19.png" >}}

1. If the test has succeeded, you will see the following screen. Your local account is now considered a SAML account. To log in to Redis Cloud console going forward, select **Sign in with SSO**.

{{<image filename="images/rc/saml/sm_saml_11.png" >}}

1. Enter your SAML email and click **Login**.
If everything is configured correctly, you will see the the Redis Cloud console screen. Your local account is now considered a SAML account.

{{<image filename="images/rc/saml/ad_saml_21.png" >}}
To log in to the Redis Cloud console from now on, click on **Sign in with SSO**.

You have successfully configured SAML as an identification provider.
{{<image filename="images/rc/button-sign-in-sso.png" width="50px" alt="Sign in with SSO button">}}

## Claim conditions and user groups

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -163,10 +163,8 @@ A logout notification screen displays, letting you know that you are redirected

{{<image filename="images/rc/saml/google_workspace_saml_18.png" >}}

1. If everything is configured correctly, you should get a **SAML activation succeeded** message. From this point forward, users need to click **SSO** to log in to the Redis Cloud console.
If everything is configured correctly, you will see the the Redis Cloud console screen. Your local account is now considered a SAML account.

{{<image filename="images/rc/saml/google_workspace_saml_19.png" >}}
To log in to the Redis Cloud console from now on, click on **Sign in with SSO**.

A message displays, stating that your local user is now converted to a SAML user. Select **Confirm**.

You have successfully configured Google Workspace as an identification provider.
{{<image filename="images/rc/button-sign-in-sso.png" width="50px" alt="Sign in with SSO button">}}
Original file line number Diff line number Diff line change
Expand Up @@ -253,24 +253,14 @@ To activate SAML, you must have a local user (or social sign-on user) with the *

{{<image filename="images/rc/saml/sm_saml_8.png" >}}

A popup appears, stating that to test the SAML connection, you need to log in with Okta credentials of the user defined in the Redis Cloud group. This user is part of the group to which you assigned the Redis Cloud application.

{{<image filename="images/rc/saml/sm_saml_9.png" >}}
A popup appears, stating that to test the SAML connection, you need to log in with Okta credentials of the user defined in the Redis Cloud group. This user is part of the group to which you assigned the Redis Cloud application. Select **Continue** to go to the Okta login screen.

1. The Okta login screen appears. Enter the credentials and select **Sign In**.

{{<image filename="images/rc/saml/okta_saml_app_int_14.png" >}}

1. If the test succeeds, your local account is now considered a SAML account. To log in to Redis Cloud console going forward, select **Sign in with SSO**.

{{<image filename="images/rc/saml/sm_saml_11.png" >}}

1. Enter your SAML email and click **Login**.

{{<image filename="images/rc/saml/okta_saml_app_int_15.png" >}}

1. If only one user is defined in Redis Cloud console, you get a popup window where you select **Confirm** to convert the local user to a SAML user. Consider setting up one more local user other than a SAML user.
If everything is configured correctly, you will see the the Redis Cloud console screen. Your local account is now considered a SAML account.

{{<image filename="images/rc/saml/okta_saml_app_int_16.png" >}}
To log in to the Redis Cloud console from now on, click on **Sign in with SSO**.

1. You have successfully configured SAML as an identity provider.
{{<image filename="images/rc/button-sign-in-sso.png" width="50px" alt="Sign in with SSO button">}}
Original file line number Diff line number Diff line change
Expand Up @@ -241,20 +241,14 @@ Replace `<ID>` so it matches the AssertionConsumerService Location URL ID (the c

{{<image filename="images/rc/saml/sm_saml_8.png" >}}

A popup appears, explaining that, to test the SAML connection, you need to log in with Okta credentials of the user defined in the Redis Cloud group. This user is part of the group to which you assigned the Redis Cloud application.
A popup appears, explaining that, to test the SAML connection, you need to log in with Okta credentials of the user defined in the Redis Cloud group. This user is part of the group to which you assigned the Redis Cloud application. Select **Continue** to go to the Okta login screen.

{{<image filename="images/rc/saml/sm_saml_9.png" >}}

1. The Okta log-in screen appears. Enter the credentials and select **Sign In**.
1. The Okta login screen appears. Enter the credentials and select **Sign In**.

{{<image filename="images/rc/saml/sm_saml_10.png" >}}

1. If the test succeeds, the next screen appears. Your local account is now considered a SAML account. Going forward, to log in to Redis Cloud console, select **Sign in with SSO**.

{{<image filename="images/rc/saml/sm_saml_11.png" >}}

1. Enter your SAML email and select **Login**
If everything is configured correctly, you will see the the Redis Cloud console screen. Your local account is now considered a SAML account.

{{<image filename="images/rc/saml/sm_saml_12.png" >}}
To log in to the Redis Cloud console from now on, click on **Sign in with SSO**.

You have successfully configured SAML as an identity provider.
{{<image filename="images/rc/button-sign-in-sso.png" width="50px" alt="Sign in with SSO button">}}
Original file line number Diff line number Diff line change
Expand Up @@ -162,25 +162,19 @@ To activate SAML, you must have a local user (or social sign-on user) with the *

1. Return to the Redis Cloud console and select **Activate**.

{{<image filename="images/rc/saml/ping_identity_saml_19.png" >}}
{{<image filename="images/rc/saml/sm_saml_8.png" >}}

1. A popup appears, explaining that to test the SAML connection, you need to log in with credentials of a user defined in Ping Federate.

{{<image filename="images/rc/saml/sm_saml_9.png" >}}
1. A popup appears, explaining that to test the SAML connection, you need to log in with credentials of a user defined in Ping Federate. Select **Continue** to go to the Ping Federate login screen.

1. The Ping Federate login screen will appear. Enter the credentials and select **Sign In**.

{{<image filename="images/rc/saml/ping_identity_saml_20.png" >}}

1. If the test has succeeded, you will see the following screen. Your local account is now considered a SAML account. To log in to Redis Cloud console going forward, select the **Sign in with SSO** button.

{{<image filename="images/rc/saml/sm_saml_11.png" >}}

1. In the screen, enter your SAML email and select *Login*.
If everything is configured correctly, you will see the the Redis Cloud console screen. Your local account is now considered a SAML account.

{{<image filename="images/rc/saml/ad_saml_21.png" >}}
To log in to the Redis Cloud console from now on, click on **Sign in with SSO**.

You have successfully configured SAML as an identity provider.
{{<image filename="images/rc/button-sign-in-sso.png" width="50px" alt="Sign in with SSO button">}}

## IdP-initiated SSO

Expand Down
4 changes: 2 additions & 2 deletions content/operate/rc/security/cidr-whitelist.md
Original file line number Diff line number Diff line change
Expand Up @@ -30,15 +30,15 @@ To define the CIDR allow list for a database:

1. Enter the first IP address (in CIDR format) you want to allow in the text box and then select the check mark to add it to the allow list:

{{<image filename="images/rc/database-details-configuration-tab-security-cidr-allowlist-add-first-ip.png" width="300px" alt="Add the first IP address to the CIDR allow list." >}}
{{<image filename="images/rc/database-details-configuration-tab-security-cidr-allowlist-add-first-ip.png" width="80%" alt="Add the first IP address to the CIDR allow list." >}}

1. To allow additional IP addresses:

1. Select **Add CIDR**.

1. Enter the new IP address in the text box and then select check to add it to the allow list.

{{<image filename="images/rc/database-details-configuration-tab-security-cidr-allowlist-add-more-ips.png" width="300px" alt="Add a new IP address to the CIDR allow list." >}}
{{<image filename="images/rc/database-details-configuration-tab-security-cidr-allowlist-add-more-ips.png" width="80%" alt="Add a new IP address to the CIDR allow list." >}}

1. Select **Save database** to apply your changes.

Expand Down
Binary file modified static/images/rc/access-management-saml-config.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file modified static/images/rc/button-access-management-sso-setup.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file modified static/images/rc/button-sign-in-sso.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file modified static/images/rc/saml-button-add-domain.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file modified static/images/rc/saml-button-cancel.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file modified static/images/rc/saml-button-close.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file modified static/images/rc/saml-button-confirm.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file modified static/images/rc/saml-button-delete-domain.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file modified static/images/rc/saml-domain-verified.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file modified static/images/rc/saml-enable-button.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file modified static/images/rc/saml-enter-domain.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file modified static/images/rc/saml-manage-domain-bindings.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file modified static/images/rc/saml/button-saml-link-account.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file modified static/images/rc/saml/popup-saml-get-token.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file modified static/images/rc/saml/sm_saml_1.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file modified static/images/rc/saml/sm_saml_3.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file modified static/images/rc/saml/sm_saml_8.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.