Federated Login
Federated login allows access to multiple systems using a single authentication method. After the authentication process is completed, the user gains access to the remaining federated domains without the need to perform additional logins.
We support three types of federated login:
Click the links above for configuration details for each option. This configuration is performed from the Federated Login screen in Sensedia Access Control:
.
|
Client Credentials cannot be generated using federated logins. |
|
When a federated login provider is deleted, all users associated with it are permanently deleted automatically and without prior notice. It is not possible to recover this data after deletion. |
Creating multiple users when using Federated Login
Pay close attention to attribute configuration in your identity provider (Identity Provider – IdP). If a user already has a manually created account and signs in using Federated Login, the system creates a new user if the mapped attributes do not exactly match those of the existing account.
To ensure proper user association and avoid duplicate accounts, make sure that attribute mapping in Access Control is aligned with the information provided by the identity provider.
Defining the 'username' in Federated Login
In Federated Login integration, the 'username' is defined based on the information provided by the identity provider.
-
The 'username' attribute is generated for federated users by combining a fixed identifier with the name of their Identity Provider (IdP).
-
This behavior may not meet custom user identification requirements.
To generate a 'username' aligned with your business rules, you must configure attribute mapping for the preferred_username attribute.
For more information, see the AWS documentation.
Share your suggestions with us!
Click here and then [+ Submit idea]