Skip to main content

Provision users from third-party identity providers

Configure Just-in-Time (JIT) provisioning to automatically create user accounts in identity pools when users sign in through a third-party identity provider. For background on how the provisioning flow works, see Automated user provisioning.

Prerequisites

  • A third-party identity provider connected and configured in your workspace. If you are provisioning users who sign in to web applications, connect the identity provider in the same workspace as the application. If you are provisioning users who administer your SecureAuth tenant, connect the identity provider in the Admin workspace.
  • An identity pool to store the provisioned users. You can create a dedicated pool or reuse an existing one.

Enable Just-in-Time provisioning

  1. Go to Authentication > Providers and select the identity provider you want to provision users from.
  2. Select the Provisioning tab.
  3. Select the Just-in-Time Provisioning card.
  4. Select the identity pool where provisioned users will be stored.
  5. Click Save.

Enable JIT provisioning on the Provisioning tab

After you save, users who sign in through this identity provider are automatically created in the selected identity pool on first login.

Try it with the demo workspace

The fastest way to test provisioning end-to-end is with the demo workspace, which comes with an embedded Google identity provider and a demo application.

  1. Create a demo workspace with the demo application enabled.

  2. Create an identity pool or reuse an existing one.

  3. Enable JIT provisioning for the Google identity provider and select your identity pool.

  4. Go to Overview and launch the User Portal.

    Launch the demo portal from the Dashboards page

  5. Sign in with the Google identity provider.

  6. Go back to the identity pool you configured and verify the provisioned user appears.

    Provisioned user in the identity pool

Configure identifier correlation

Identifier correlation maps an incoming identity provider attribute to an identity pool attribute so SecureAuth can match returning users to existing accounts. The default correlation maps the identity provider email to the identity pool email.

  1. Go to the identity provider's Provisioning tab.
  2. Under Identifier Correlation, select the incoming attribute from the identity provider (for example, Email).
  3. Select the matching identity pool attribute (for example, Email).
  4. Click Save.

Configure attribute provisioning

Attribute provisioning maps identity provider attributes to identity pool user profile fields. SecureAuth includes default mappings (email, first name, last name) and you can add custom mappings.

  1. Go to the identity provider's Provisioning tab. The default attribute mappings are displayed.

  2. Click Add row to define additional mappings.

  3. Select the incoming attribute from the identity provider's authentication context.

  4. Select the target identity pool attribute. You can map to:

    To set a fallback value for an attribute, click Set default value next to the mapping row. The default value is used when the identity provider does not return the attribute.

    note

    You can only provision attributes that exist in the user's authentication context. If you do not see an expected attribute, verify that you added it when connecting the identity provider and mapped it to the authentication context.

    Attribute provisioning configuration

  5. Click the three-dot menu next to a row to delete the mapping or enable/disable attribute updates on each sign-in.

  6. Click Save.

See also