多维表格
You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
 
 
 
 
 
 

4.7 KiB

title description tags keywords
Overview Learn about different methods available for authentication with NocoDB. [SSO Overview] [SSO Overview Authentication Email Password SAML OIDC]

This section provides an overview about different mechanisms available for authentication in NocoDB.

Email and password based

This is the default form based authentication mechanism available in NocoDB. Users can sign up using email and password and then login using the same credentials.

Single Sign On (SSO)

:::warning SSO is available under private beta for self hosted enterprise customers. Please reach out to us for early access. :::

SSO is a session and user authentication service that permits a user to use one set of login credentials to access multiple applications. The service authenticates the end user for all the applications the user has been given rights to and eliminates further prompts when the user switches applications during the same session.

SSO functionality is achieved by establishing a connection with an identity provider (IdP), which serves as a repository for managing users digital identities within the digital or cloud-based ecosystem. Through the use of protocols like the Security Assertion Markup Language (SAML 2.0), such as in the case of NocoDB, SSO facilitates the secure exchange of authentication data between the identity provider and the service providers.

Google OAuth

Google OAuth, short for Open Authorization, is a widely used and standardized protocol that facilitates secure authentication and authorization processes, particularly in the context of web and mobile applications. Developed by Google, OAuth enables users to grant third-party applications limited access to their resources without exposing their credentials. This authorization framework is based on token-based authentication, where users can log in using their Google credentials, and developers can obtain an access token to interact with Google APIs on the user's behalf.

Please follow the details in the article to integrate with Google OAuth

Security Assertion Markup Language (SAML)

The Security Assertion Markup Language (SAML) stands as a critical protocol in the realm of secure authentication and authorization processes. Developed to enable Single Sign-On (SSO) functionality, SAML facilitates the exchange of authentication and authorization data between an identity provider (IdP) and a service provider (SP). This XML-based protocol ensures the secure transfer of user identity information, allowing individuals to access multiple applications and services with a single set of credentials. SAML operates on a trust model, wherein the identity provider asserts the user's identity to the service provider, which, in turn, grants or denies access based on the provided assertions.

Please follow the details in the article below to integrate with various popular SAML providers.

  1. Okta
  2. Auth0
  3. Ping Identity
  4. Active Directory
  5. Keycloak

OpenID Connect (OIDC)

The OpenID Connect (OIDC) protocol is a modern authentication layer built on top of the OAuth 2.0 framework, designed to address user authentication and authorization challenges in web and mobile applications. OIDC provides a standardized and secure way for applications to verify the identity of end-users. Leveraging JSON Web Tokens (JWTs), OIDC enables the exchange of user identity information between the identity provider (IdP) and the Service provider, typically a web application.

Please follow the details in the article below to integrate with various popular OIDC providers.

  1. Okta
  2. Auth0
  3. Ping Identity
  4. Active Directory