Single Sign-On Overview
This topic provides an overview of the Single Sign-On service for Pivotal Cloud Foundry (PCF).
The Single Sign-On service is an all-in-one solution for securing access to applications and APIs on PCF. The Single Sign-On service provides support for native authentication, federated single sign-on, and authorization. Operators can configure native authentication and federated single sign-on, for example SAML, to verify the identities of application users. After authentication, the Single Sign-On service uses OAuth 2.0 to secure resources or APIs.
The Single Sign-On service allows users to log in through a single sign-on service and access other applications that are hosted or protected by the service. This improves security and productivity since users do not have to log in to individual applications.
Developers are responsible for selecting the authentication method for application users. They can select native authentication provided by the User Account and Authentication (UAA) or external identity providers. UAA is an open source identity server project under the Cloud Foundry (CF) foundation that provides identity based security for applications and APIs.
OAuth 2.0 Authorization
After authentication, the Single Sign-On service uses OAuth 2.0 for authorization. OAuth 2.0 is an authorization framework that delegates access to applications to access resources on behalf of a resource owner.
Developers define resources required by an application bound to a Single Sign-On (SSO) service instance and administrators grant resource permissions. See the Configure Applications topic for more details.
The following table provides version and version-support information about Single Sign-On for PCF:
|Release date||November 9, 2017|
|Compatible Ops Manager version(s)||v1.9 or later|
|Compatible Elastic Runtime version(s)||v1.9 or later|
|IaaS support||AWS, GCP, OpenStack, and vSphere|
Consider the following compatibility information before upgrading Single Sign-On for PCF. Pivotal recommends upgrading PCF before upgrading SSO to the supported version. For example, when upgrading from PCF v1.8 to PCF v1.9, upgrade PCF so that SSO v1.2 is running on PCF v1.9, and then upgrade SSO v1.2 to SSO v1.3 as soon as possible.
|Elastic Runtime Version||Supported Upgrades from SSO Versions|
|1.9.x & 1.10.x||1.2.0–1.2.x||1.3.x|
- The SSO v1.1.x tiles are compatible with PCF v1.7.x
- The SSO v1.2.x tiles are compatible with PCF v1.8.x and later
- The SSO v1.3.x tiles are compatible with PCF v1.9.x and later
- Getting Started with Single Sign-On
- Manage Service Plans
- Manage Service Instances
- Configure Identity Providers
- Configure Applications
- Manage Resources
- Active Directory Federation Services Integration Guide
- Azure Active Directory Integration Guide
- CA Single Sign-On Integration Guide
- Okta Integration Guide
- PingFederate Integration Guide
- PingOne Cloud Integration Guide