Single Sign-On Overview
This topic provides an overview of the Single Sign-On service for Pivotal Cloud Foundry (PCF).
The Single Sign-On service is an all-in-one solution for securing access to applications and APIs on PCF. The Single Sign-On service provides support for native authentication, federated single sign-on, and authorization. Operators can configure native authentication and federated single sign-on, for example SAML, to verify the identities of application users. After authentication, the Single Sign-On service uses OAuth 2.0 to secure resources or APIs.
The Single Sign-On service allows users to log in through a single sign-on service and access other applications that are hosted or protected by the service. This improves security and productivity since users do not have to log in to individual applications.
Developers are responsible for selecting the authentication method for application users. They can select native authentication provided by the User Account and Authentication (UAA) or external identity providers. UAA is an open source identity server project under the Cloud Foundry (CF) foundation that provides identity based security for applications and APIs.
SSO supports service provider-initiated authentication flow and single logout. It does not support identity provider-initiated authentication flow. All SSO communication takes place over SSL.
After authentication, the Single Sign-On service uses OAuth 2.0 for authorization. OAuth 2.0 is an authorization framework that delegates access to applications to access resources on behalf of a resource owner.
Developers define resources required by an application bound to a Single Sign-On (SSO) service instance and administrators grant resource permissions. See the Configure Applications topic for more details.
The following table provides version and version-support information about Single Sign-On for PCF:
|Release date||April 19, 2018|
|Compatible Ops Manager version(s)||v2.0 and v2.1|
|Compatible Pivotal Application Service (PAS) version(s)||v2.0 and v2.1|
|IaaS support||AWS, GCP, OpenStack, Azure, and vSphere|
Consider the following compatibility information before upgrading Single Sign-On for PCF. Pivotal recommends upgrading PCF before upgrading SSO to the supported version. For example, when upgrading from PCF v2.0 to PCF v2.1, upgrade PCF so that SSO v1.5.3 is running on PCF v2.1, and then upgrade SSO v1.5.3 to SSO v1.6 as soon as possible.
Breaking Change: You can only upgrade to SSO v1.6 on PCF v2.0.
For information about upgrading to PCF v2.0, see Upgrading Pivotal Cloud Foundry.
|Elastic Runtime* or PAS Version||Supported Upgrades from SSO Versions|
* As of PCF v2.0, Elastic Runtime is renamed Pivotal Application Service (PAS).
- The SSO v1.4.x tiles are compatible with PCF v1.11.x and v1.12.x.
- The SSO v1.5.x tiles are compatible with PCF v1.12.x.
- The SSO tiles v1.5.3 and later are compatible with PCF v1.2.x, v2.0.x, and v2.1.x.
- The SSO v1.6.x tiles are compatible with PCF v2.0.x and v2.1.x.
Use these guides to help you plan and implement your integration with the Single Sign-On service for PCF.
- Active Directory Federation Services (AD FS) Integration Guide
- Azure Active Directory SAML Integration Guide
- Azure Active Directory OIDC Integration Guide
- CA Single Sign-On Integration Guide
- Google Cloud Platform OpenID Connect Integration Guide
- Okta Integration Guide
- PingFederate Integration Guide
- PingOne Cloud Integration Guide
- Plan-to-Plan OIDC Integration Guide
- Getting Started with Single Sign-On
- Using the System Plan
- Manage Service Plans
- Manage Service Instances
- Configure Identity Providers
- Identity Provider Discovery
- Manage Users
- Configure Applications
- Manage Resources