Skip to content

SSO Group Mapping

Automatically translated

With Group Mappings, owners and admins can link groups from their identity provider (IdP) to organizations, roles, and groups in DeepCloud. This allows the assignment of SSO users to DeepCloud organizations, roles, and groups to be managed centrally in the IdP instead of manually in DeepCloud. This simplifies user management and increases consistency and security.

Group Mappings connect your IdP groups with the corresponding organizations, roles, and groups in DeepCloud. When an SSO user signs in, DeepCloud automatically assigns the organizations, roles, and groups that match the user’s security groups in the IdP.

The management of your SSO users’ organizations, roles, and groups is therefore controlled centrally by the IdP, which serves as the central source for user, role, and group information.

To use Group Mappings, your IdP must be configured to send user group information during SSO authentication.

Prerequisites

Microsoft Entra (Azure)

Configuration IDP

  1. Search for the DeepCloud App registrations in the Azure portal
    Go to the Azure portal and navigate to Azure Active Directory > Microsoft Entra ID > App registrations. Search for your DeepCloud application and select it.
  2. Select the Token configuration option in the navigation bar
  3. Click on Add group claim. The “Group claim” dialog box is displayed.
    a. Select “Security groups” as the group type.
  4. Select Group ID to use the unique group identifier. With this selection, the group mapping can be created in DeepCloud using the object IDs (e.g. efa39f24-e8db-4526-b65d-cc029d874c3c).
OKTA

Configuration IDP

  1. In the Okta Admin Dashboard, search for the DeepCloud application
    Go to the Okta Admin Dashboard and navigate to Applications > Applications. Search for your DeepCloud application and select it.
  2. Select the Sign On option in the navigation bar
  3. Under OpenID Connect ID Token, click on Edit.
    a. For “Groups claim type”, select Filter
    b. For “Groups claim filter”, select “groups” “Match Regex” “.*”
  4. Save the changes

To ensure that OKTA sends the group claims in the ID token, follow these steps:

  1. Navigate to Security > API.
  2. Select the desired Authorization Server that you want to use for the DeepCloud application. Normally this is the “default”
  3. Click on the Claims tab.
  4. Add a new group claim
    a. Click on the “Add Claim” button.
    b. Give the claim the name “groups”.
    c. Select “ID Token – Always” as the Token type
    d. Select “Groups” as the Value type
    e. Select “.*” for the filter “Matches Regex”
  5. Save the adjustments
Configuration Group Mapping in DeepCloud
  1. Go to DeepAdmin and navigate to Organization > Settings > Security & Login, then click Manage.Select the desired domain to open its settings.
  2. Switch to the Group Mappings tab to edit existing mappings or create new ones.
  3. Click Add Mapping to create a new Group Mapping.
    a. Enter the object ID of the security group (Microsoft Entra ID) or the group name (Okta Admin).
    b. Select the corresponding organisation.
    c. Choose the desired role or group.
⚠️Important Note on Access Control

Once a group mapping is defined, access to the organization and membership in DeepCloud groups is controlled exclusively via group mapping and the IdP. Users who do not belong to a mapped IdP group will not receive access or will lose existing access rights.

  • To preserve existing access rights, a group mapping must be created for every DeepCloud group. Ensure that all groups and roles are fully covered.
  • Make sure to create a group mapping for Admins and/or Owners to avoid losing administrative access to the organization once group mappings are active.
  • Ensure that all relevant users are assigned to the appropriate IdP groups before the first group mapping is activated.


Note

  • You cannot define a Group Mapping if default groups are already configured. Remove them first before creating a Group Mapping.
  • The Group Mapping becomes active once at least one mapping is defined and the option Automatically add users of this domain to the organization upon login is enabled in the domain configuration.

Limitations
DeepCloud supports login tokens containing up to 150 group IDs (OKTA up to 100 groups). If you need to use more than 200 groups per user, please refer to the following support article.

Did this answer your question?