Skip to content

Commit 00890e4

Browse files
fix(iam): saml review
1 parent f594627 commit 00890e4

File tree

2 files changed

+50
-6
lines changed

2 files changed

+50
-6
lines changed

pages/account/how-to/log-in-to-the-console.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -37,7 +37,7 @@ A confirmation email is sent to your inbox, confirming that you have authenticat
3737

3838
## How to log in with SSO
3939

40-
Scaleway provides Single Sign-On (SSO) options for a seamless login experience. You can use your Google or Microsoft account to log in to the console. To do so, make sure the email address associated with your Scaleway account matches the email address of your Google or Microsoft account.
40+
Scaleway provides Single Sign-On (SSO) options for a seamless login experience. By default, you can use your Google or Github account to log in to the console. To do so, make sure the email address associated with your Scaleway account matches the email address of your Google or Github account. If your Organization has [set up login via SAML](/iam/how-to/set-up-identity-federation), you must use the Identity Provider configured for your company to log in with SSO.
4141

4242
1. Open your web browser and go to the [Scaleway console](https://console.scaleway.com).
4343
2. Click the **Log in with Google**, **Log in with Microsoft**, or **Log in with GitHub** button, depending on the account you want to use.

pages/iam/how-to/set-up-identity-federation.mdx

Lines changed: 49 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -6,14 +6,35 @@ dates:
66
posted: 2025-08-21
77
---
88

9-
You can set up Identity Federation at Scaleway to ensure your [members can log in via Single Sign-On (SSO)]().
9+
Scaleway supports Identity Federation to provide your teams with secure access to their accounts via Single Sign-On (SSO). Depending on your organization’s requirements, you can use either built-in OAuth2 providers or configure SAML for centralized identity management.
1010

11-
At Scaleway we use Security Assertion Markup Language (SAML) to provide Identity Federation. You can link user identities across multiple independent systems and organizations to enable SSO across domains. You can manage your Scaleway identities via your Identity Provider of choice, as long as the provider supports SAML.
11+
| Feature | **OAuth2** | **SAML** |
12+
|--------|-------------------------------|--------|
13+
| **Availability** | Enabled by default for all organizations | Available, but requires setup |
14+
| **Supported Providers** | Google, GitHub | Any SAML-compatible Identity Provider |
15+
| **Setup Required** | No | Yes — must be configured by an IAM admin |
16+
| **User Access** | Any Scaleway member whose email is verified with Google or GitHub | Only users explicitly defined in the Identity Provider |
17+
| **Centralized Management** | No | Yes — manage users from your Identity Provider |
18+
19+
<Message type="important">
20+
Keep in mind that:
21+
- OAuth2 logins are automatically disabled when SAML is configured. If SAML is not set up, members can continue to use Google or GitHub for SSO.
22+
- SSO with SAML does not apply to an Organization's Owner. Owners can log in with SSO with OAuth2.
23+
</Message>
24+
25+
Follow the steps below to set up Identity Federation for your Organization through SAML at Scaleway.
1226

1327
<Requirements />
1428

1529
- A Scaleway account logged into the [console](https://console.scaleway.com)
1630
- [Owner](/iam/concepts/#owner) status or [IAM permissions](/iam/concepts/#permission) allowing you to perform actions in the intended Organization
31+
- An Identity Provider (IdP) configured in your company, making sure it includes all users who need to access Scaleway. Some examples of IdPs:
32+
- Okta
33+
- OneLogin
34+
- Microsoft Entra ID (prev. Azure AD)
35+
- PingIdentity
36+
- Google Workspace
37+
- Keycloak
1738

1839
## How to set up a SAML connection
1940

@@ -29,16 +50,39 @@ At Scaleway we use Security Assertion Markup Language (SAML) to provide Identity
2950
5. Click **Next**.
3051
6. Enter the requested URLs in their respective boxes.
3152

32-
This is the information referring to your Identity Provider that Scaleway needs to confirm the connection. They are:
33-
- The Single Sign-On URL, and
34-
- The Identity Provider's Entity ID
53+
This is the information referring to your Identity Provider that Scaleway needs to confirm the connection. It can be found in your IdP's configuration page. They are:
54+
- **Single Sign-On URL** - This is the URL your members will be redirected to when logging in with SAML
55+
- **The Identity Provider's Entity ID**
3556
7. Click **Confirm**.
3657
8. Enter the signing certificate generated by your Identity Provider in the box.
3758
<Message type="important">
59+
You certificate entry must start with:
60+
```
61+
-----BEGIN CERTIFICATE-----
62+
```
63+
And end with:
64+
```
65+
-----END CERTIFICATE-----
66+
```
67+
</Message>
68+
69+
<Message type="note">
3870
You can close the Identity Provider pop-up without adding the certificate right away. The certificate can [be added at a later time](#how-to-add-a-certificate). However, while the certificate is not added, the connection between Scaleway and your Identity Provider will not be complete and the SSO feature will not work for your Organization members.
3971
</Message>
4072
9. Click **Complete setup**.
4173

74+
Once setup is complete, members can log in via SAML.
75+
76+
<Message type="tip">
77+
You can test the connection by creating a member and logging in with the new member account.
78+
</Message>
79+
80+
<Message type="important">
81+
Keep in mind that:
82+
- Members need to already have been [created manually](/iam/how-to/manage-members/#how-to-create-a-member) in Scaleway to log in.
83+
- If you delete a user in the IdP, the corresponding Member is not automatically deleted in your Scaleway Organization. The [deletion must happen manually](/iam/how-to/manage-members/#how-to-delete-a-member).
84+
</Message>
85+
4286
## How to update the connection configuration
4387

4488
If you change your Identity Provider, you will need to re-configure your SAML connection.

0 commit comments

Comments
 (0)