Advanced Options for Federated Authentication
On this page
- OAuth 2.0 authentication for programmatic access to Cloud Manager is available as a Preview feature.
- The feature and the corresponding documentation might change at any time during the Preview period. To use OAuth 2.0 authentication, create a service account to use in your requests to the Cloud Manager Public API.
You can configure advanced options in your Federated Authentication instance for greater control over your federated users and authentication flow.
Federation Management Access
You can manage federated authentication from the Federation
Management Console. You can access the console as long as you are an
Organization Owner
in one or more organizations that are
delegating federation settings to the instance.
To open the Federation Management Console:
In MongoDB Cloud Manager, go to the Organization Settings page.
If it's not already displayed, select your desired organization from the Organizations menu in the navigation bar.
Click the Organization Settings icon next to the Organizations menu.
The Organization Settings page displays.
Assign a Default User Role for an Organization
- You can configure MongoDB Atlas to automatically provision each user who
- authenticates through the IdP with a default role in a mapped organization. You can select different roles for different organizations.
Note
The selected role only applies to users who authenticate through the IdP if they do not already have a role in the organization.
Restrict Access to an Organization by Domain
You can specify a list of approved domains to prevent users outside of those domains from accessing your organization. Use this list to define a list of approved domains for your organization without needing to directly map those domains to your IdP.
Important
Considerations
Once you enable the Restrict Access by Domain option:
You can only invite new users to join your organization whose email addresses are in the approved list of domains.
Users who are already in your organization whose usernames do not contain a domain in the approved list are not restricted access to your organization.
Any domains which are mapped to your IdP are automatically added to the approved list.
From the Federation Management Console:
Add domains to the approved list.
To add domains to the approved list, you can either:
Click Add Domains from Existing Members. Cloud Manager opens a modal containing domains from existing user email addresses in your organization. Use this list to easily enable access for users who are already part of your organization.
Use the checkboxes to select the desired domains, then click Add to add them to the approved list.
Click Add Domains. Cloud Manager opens a modal where you can manually add domains the approved list.
Enter the domain you want approve in the input box, then click Add. Repeat this process for each domain you want to approve.
Note
If you have restricted user membership to your federation, Cloud Manager warns you if you add a domain which is being used to access organizations outside of your federation.
Once you have added all desired domains, click Submit.
Bypass SAML Mode
Bypass SAML Mode provides a login URL which bypasses your federated authentication, and instead allows you to authenticate with your Cloud Manager credentials.
If your Federated Authentication settings are not properly configured, you may not be able to log in to Cloud Manager through your IdP. The Bypass SAML Mode URL helps prevent you from being locked out of your Cloud Manager organization. While configuring and testing your IdP, we recommend that you make note of the Bypass SAML Mode URL to ensure you can log in to Cloud Manager and properly configure your Federated Authentication settings.
Each Bypass SAML Mode URL is associated with an individual IdP, and corresponds to the IdP's Login URL.
Bypass SAML Mode is enabled by default, however you may want to disable it as a security measure once you are confident that you have properly configured your Federated Authentication.
To set Bypass SAML Mode, from the Federation Management Console:
Sign in After Enabling Bypass SAML Mode
After you enable Bypass SAML Mode, you must sign in to Cloud Manager using:
The Bypass SAML Mode URL for your IdP.
A username that:
Contains the domain you mapped to your IdP.
You have used to sign in to MongoDB Atlas or Cloud Manager before you configured Federated Authentication.
Restrict User Membership to the Federation
You can prevent users in your Federated Authentication instance from creating new organizations or using their credentials to access organizations outside of the federation. Configure this setting for full control of your federated users and to help ensure that federated users only have access to desired Cloud Manager organizations.
Important
This setting applies to the entire federation, including all Identity Providers and Organizations within the federation.
Considerations
Once you enable this setting:
No users in your Federated Authentication instance can gain access to organizations outside of your federation.
Similarly, no federated users can accept or receive invitations to join organizations outside of your federation.
Users in your federation with the
Organization Owner
role can still create new organizations. These new organizations are automatically connected to your federation.Users in your federation without the
Organization Owner
role cannot create any new organizations.Users in your federation retain access to any organizations they had access to prior to the membership restriction.
Procedure
From the Federation Management Console:
View User Conflicts
If your federation contains users who belong to organizations outside of your federation, Cloud Manager displays a warning banner. To review the conflicting users, click View User Conflicts.
Cloud Manager displays a modal with a list of users that conflict with the federation restriction. Consider contacting these users to make them aware of the restriction.