Skip to main content
A newer release of this product is available.

Requirements for using single sign-on

Contributors netapp-madkat netapp-perveilerk

Before enabling single sign-on (SSO) for a StorageGRID system, review the requirements in this section.

Identity provider requirements

StorageGRID supports the following SSO identity providers (IdP):

  • Active Directory Federation Service (AD FS)

  • Azure Active Directory (Azure AD)

  • PingFederate

You must configure identity federation for your StorageGRID system before you can configure an SSO identity provider. The type of LDAP service you use for identity federation controls which type of SSO you can implement.

Configured LDAP service type Options for SSO identity provider

Active Directory

  • Active Directory

  • Azure

  • PingFederate

Azure

Azure

AD FS requirements

You can use any of the following versions of AD FS:

  • Windows Server 2022 AD FS

  • Windows Server 2019 AD FS

  • Windows Server 2016 AD FS

Note Windows Server 2016 should be using the KB3201845 update, or higher.
  • AD FS 3.0, included with Windows Server 2012 R2 update, or higher.

Additional requirements

  • Transport Layer Security (TLS) 1.2 or 1.3

  • Microsoft .NET Framework, version 3.5.1 or higher

Server certificate requirements

By default, StorageGRID uses a management interface certificate on each Admin Node to secure access to the Grid Manager, the Tenant Manager, the Grid Management API, and the Tenant Management API. When you configure relying party trusts (AD FS), enterprise applications (Azure), or service provider connections (PingFederate) for StorageGRID, you use the server certificate as the signature certificate for StorageGRID requests.

If you have not already configured a custom certificate for the management interface, you should do so now. When you install a custom server certificate, it is used for all Admin Nodes, and you can use it in all StorageGRID relying party trusts, enterprise applications, or SP connections.

Note Using an Admin Node's default server certificate in a relying party trust, enterprise application, or SP connection is not recommended. If the node fails and you recover it, a new default server certificate is generated. Before you can sign in to the recovered node, you must update the relying party trust, enterprise application, or SP connection with the new certificate.

You can access an Admin Node's server certificate by logging in to the command shell of the node and going to the /var/local/mgmt-api directory. A custom server certificate is named custom-server.crt. The node's default server certificate is named server.crt.

Port requirements

Single sign-on (SSO) is not available on the restricted Grid Manager or Tenant Manager ports. You must use the default HTTPS port (443) if you want users to authenticate with single sign-on. See Control access through firewalls.