Skip to content

Global IDP

The Rafay platform traditionally supports Identity Provider (IDP) configurations at the customer organization level, requiring each customer org to configure its own IDP settings.

This feature applies for scenarios where a Cloud Provider (aka partner) wishes to deploy and operate an IdP where they manage user identifies for their customers. There is a need for a shared IDP configuration across all orgs under the cloud provider.

When the Global IDP feature is enabled for a partner, a single IDP configured in the partner’s default org can be used to authenticate users across all orgs under the partner. This simplifies user authentication and IDP management in multi-tenant environments.

Global IdP


Enabling Global IDP

Rafay enables the Global IDP feature for a partner based on requirements. Once enabled, the following setting will be visible in the partner configuration:

"settings": {
  "idp_setting": {
    "common_idp_for_all_orgs": true
  }
}

Global IDP Workflow

  • A single IDP is configured in the default organization of the partner
  • Users access the partner’s Rafay Console portal
  • The login behavior depends on whether the user exists in the local Rafay user database

Case 1: User Exists in Local Rafay User Database

If the entered email address matches a local user record:

  • The user is shown two options:
    • Login With SSO
    • Login With Password

Create IdP

This provides flexibility to authenticate through either method.


Case 2: User Does Not Exist in Local Rafay User Database

If the user is not found in the local database: - Only the Login With SSO option is shown - The user is redirected to the IDP configured in the partner’s default organization

Create IdP

IDP Authentication and organization Mapping

  • After clicking Login With SSO, the user is redirected to the IDP provider configured in the default organization
  • The IDP must include the organization identifier in the SAML response
  • Rafay uses this attribute to route the user to the appropriate organization after authentication

Support for Mixed Mode

If a subset of organizations require a custom IDP and others should use the Global IDP: - Create individual IDPs in those specific organizations using their domain name(s) - Create the Global IDP in the default organization


Login Flow

  • If a user's domain matches a configured organization-level IDP, they are authenticated using that IDP
  • Otherwise, the user is authenticated using the Global IDP
  • If the user also exists in the local database, both login options (SSO and password) are shown

Note: For Global IDP integration, customers using Keycloak must use version 26.2.x or later.