copyright | lastupdated | keywords | subcollection | ||
---|---|---|---|---|---|
|
2023-05-17 |
account |
{{site.data.keyword.attribute-definition-list}}
{: #federation-option-for-you}
In the past, {{site.data.keyword.Bluemix_notm}} supported integration with customer's user directories by using IBMid SAML federation. In May 2020, {{site.data.keyword.Bluemix_notm}} introduced an alternative method for clients to federate identities with their {{site.data.keyword.Bluemix_notm}} account.
By default, when you create an account in {{site.data.keyword.Bluemix_notm}} you use an IBMid for user identity. IBMid is the ID as a Service (IDaaS) from {{site.data.keyword.IBM_notm}} used to access {{site.data.keyword.IBM_notm}} web-based services, including {{site.data.keyword.Bluemix_notm}} resources. The IBMid is based on your company's email address and a password that is managed by IBMid. IBMid allows you to federate to your own corporate user directory or a third-party Identity Provider (IdP) service that you might already use, such as Okta.
Federating to your own directory simplifies the process of adding users to your account, without requiring an IBMid with a separate password. However, there are cases where it might not be feasible for you to use IBMid to federate your corporate user directory. The alternative is to create an {{site.data.keyword.appid_full_notm}} instance in your account and connect it to your chosen IdP.
This topic explains the differences between the following two methods:
- Federating with IBMid.
- Federating with your own instance of {{site.data.keyword.appid_full_notm}}.
To decide which option is applicable to your use case, review the following sections.
{: #federation-options}
{{site.data.keyword.Bluemix_notm}} supports the following user types:
Non-federated IBMid users : Users with a valid email address can create an IBMid and let IBMid manage the password. Your company email domain is not federated with IBMid, and you choose to keep it as is. Any user that uses your email domain can create their own IBMid, and the password they create is managed by IBMid. They can create an {{site.data.keyword.Bluemix_notm}} account and invite other users with an IBMid to their account. They can also access other {{site.data.keyword.IBM_notm}} web offerings by using that same IBMid.
Federated IBMid users : Enterprise customers often connect their internal user directory, or IdP, with IBMid so that their employees don't need to manage an additional password. Instead, they can reuse their normal login to their IdP to log in to {{site.data.keyword.IBM_notm}} web offerings, including {{site.data.keyword.Bluemix_notm}}. Connecting an external IdP with IBMid is called federation, and the technical underlying protocol is called SAML. Those users are often referenced as federated IBMid users. As IBMid is federating with multiple enterprise customers at the same time, one prerequisite of a successful federation is a unique email address for each IBMid user.
{{site.data.keyword.appid_full_notm}} users : Instances of the {{site.data.keyword.appid_full_notm}} can also connect to an IdP. An {{site.data.keyword.appid_short}} instance can connect to onlyone external IdP using SAML, and therefore a unique email address isn't required.
{: #owner-v-members}
To create an {{site.data.keyword.Bluemix_notm}} account, you need an IBMid user that will be the {{site.data.keyword.Bluemix_notm}} account owner. You can create this IBMid user during the {{site.data.keyword.Bluemix_notm}} account registration process, or you use an existing IBMid user. We recommend creating the account by using a functional ID or service account with a valid email address, this can help simplify account ownership continuity in your organization.
For any additional members of your {{site.data.keyword.Bluemix_notm}} account, you have the option to use normal or federated IBMid users as {{site.data.keyword.Bluemix_notm}} account members. Alternatively, you can connect your IdP to your {{site.data.keyword.Bluemix_notm}} account by using an {{site.data.keyword.appid_full_notm}} service instance. All users that log in through that {{site.data.keyword.appid_full_notm}} service instance are added to your account automatically, so you don't need to invite those users.
{: #federation-onboarding}
{{site.data.keyword.Bluemix_notm}} accounts have access to all IBMid users, federated and non-federated. IBMid users must be invited to your {{site.data.keyword.Bluemix_notm}} account. As a consequence, the same IBMid user can be member of multiple {{site.data.keyword.Bluemix_notm}} accounts at the same time. In the {{site.data.keyword.Bluemix_notm}} console, the IBMid user can select the account in which this user is working.
During configuration of your {{site.data.keyword.appid_full_notm}} service instance, you connect the service instance with your {{site.data.keyword.Bluemix_notm}} account. Therefore, users that log in by using this service instance can be member of this only one account. Those users will be automatically added to your {{site.data.keyword.Bluemix_notm}} account when they authenticate the first time.
{: #choose-federation}
The following table compares characteristics of each federation option. In both cases, the assumption is that the customer connects either an IBMid or an {{site.data.keyword.appid_full_notm}} instance with their IdP with SAML.
IBMid | {{site.data.keyword.appid_short}} | |
---|---|---|
Email address | Users must have a globally unique email address. For example, [email protected]. If your company's email domain is already federated, you can start configuring access to your account. If it's not already federated, a manual process with the IBMid federation team is required to establish federation. During the federation setup process, the customer collaborates with the IBMid federation team to define which email pattern matches with the IdP users. The decision to federate to your company's own user directory needs to involve the person in your company that can make company-wide decisions when it comes to connecting to external parties for identity services. You need to ensure that this person is included in the process. Federating with IBMid can have an impact on non-{{site.data.keyword.Bluemix_notm}} web services that your company already uses with {{site.data.keyword.IBM_notm}}. | This option requires the creation of an {{site.data.keyword.appid_short}} instance. It is a self-service option with a low usage fee. Choosing this option requires a custom URL to log in to {{site.data.keyword.Bluemix_notm}}. In addition, an {{site.data.keyword.appid_short}} instance and configuration of the federation to your IdP is required for every {{site.data.keyword.Bluemix_notm}} account. |
Costs | Customers do not need to pay to use IBMid with or without federation. | {{site.data.keyword.appid_full_notm}} instances have a low fee, with a free tier up to 1,000 users and 1,000 events (for example, logins). See the {{site.data.keyword.appid_short}} page for more details. |
Federation setup | Customers need to open a support case with IBMid Enterprise Federation to start the onboarding process. This is a manual process. | Customer creates an {{site.data.keyword.appid_full_notm}} instance and configures it according to the documented steps. This process is self-service. |
Federation maintenance (for example, certificate update) | Requires a manual interaction with the IBMid federation team. | The customer can update their {{site.data.keyword.appid_full_notm}} instance on their own (for example, this step is self-service). |
Federation scope | IBMid federation applies to every service that uses IBMid. This means that if a customer onboards to IBMid federation, this applies to his employees when logging on to {{site.data.keyword.Bluemix_notm}}, but also when using other {{site.data.keyword.IBM_notm}} SaaS offerings that are using IBMid. | The federation has impact only on the {{site.data.keyword.Bluemix_notm}} account in which the {{site.data.keyword.appid_full_notm}} instance is configured to allow logins. It also does not impact any other {{site.data.keyword.Bluemix_notm}} accounts or IBM SaaS offerings. |
Account member onboarding | Users need to be invited by their email address. | Each user that can successfully log in to the configured {{site.data.keyword.appid_full_notm}} instance will automatically be added to the {{site.data.keyword.Bluemix_notm}} account. |
Cross-account membership | IBMids can be members of multiple accounts. | Users can be members of one account only. Even if multiple {{site.data.keyword.appid_full_notm}} instances federate to the same IdP, the users are treated as separate users in each account. |
Use of SAML assertions in access group dynamic rules | Any SAML assertion sent by the IdP can be used in access group dynamic rules. | Any SAML assertion sent by the IdP can be used in access group dynamic rules. |
Reliability | IBMid is a global service with a dedicated operations team. In case of an outage in a data center, IBMid can failover to a different data center. | Any {{site.data.keyword.appid_full_notm}} instance exists in one region. Failures in that region can prevent account members from being able to log in. Users that are already logged in are usually not affected by such a failure. |
Login behavior | Users log in by using the central login page. | You need to use a special URL to log in to your {{site.data.keyword.Bluemix_notm}} account. Your account administrator gets this URL from the IAM Identity providers page in the {{site.data.keyword.Bluemix_notm}} console. |
{: caption="Table 1. Compare characteristics of the federation options, IBMid and {{site.data.keyword.appid_short}}." caption-side="top"} |
{: #scenarios}
For additional help deciding the correct option, review the common scenarios:
Using a single {{site.data.keyword.Bluemix_notm}} account : A customer is using a single {{site.data.keyword.Bluemix_notm}} account and no other IBM SaaS offerings. Since the customer is not using any other {{site.data.keyword.IBM_notm}} SaaS offering or any other {{site.data.keyword.Bluemix_notm}} account, they have no advantage in the federation scope capabilities or cross-account capabilities of IBMid. The number of users and logins are low, so the {{site.data.keyword.appid_full_notm}} option doesn't incur costs for this account. The customer decides on {{site.data.keyword.appid_full_notm}} as the federation option.
Using {{site.data.keyword.Bluemix_notm}} and other {{site.data.keyword.IBM_notm}} SaaS offerings : A customer is using {{site.data.keyword.Bluemix_notm}} and other IBM SaaS offerings. {{site.data.keyword.IBM_notm}} has a long-lasting and strong relationship with many customers. Those customers typically consume multiple {{site.data.keyword.IBM_notm}} SaaS offerings, which require all users to use IBMid user accounts to work with those {{site.data.keyword.IBM_notm}} SaaS offerings. In that case, all customer employees would have an advantage in using IBMid federation instead of federation based on {{site.data.keyword.appid_full_notm}}. The IBMid federation gives all employees the ability to use {{site.data.keyword.IBM_notm}} SaaS offerings and the {{site.data.keyword.Bluemix_notm}} console by using your Identity Provider's password management and validation.
{: #resources-federation}
The following links help you implement the federation that you choose:
IBMid Enterprise Federation Adoption Guide{: external}. : The publicly available IBMid federation guide gives you an overview about the steps that are required to federate your Identity Provider and whom to contact to get the federation implemented. Be aware that you need an "IBM Sponsor" (for example, an {{site.data.keyword.IBM_notm}} employee that works as main contact between you and the IBMid team).
{{site.data.keyword.Bluemix_notm}} Self-Service Federation for External Identity Providers : Announcement for the {{site.data.keyword.Bluemix_notm}} IAM feature to federate with an Identity Provider through SAML using {{site.data.keyword.appid_full_notm}}.
Enabling authentication from an external identity provider : Follow the steps necessary to integrate an {{site.data.keyword.appid_full_notm}} service instance with {{site.data.keyword.Bluemix_notm}} IAM so that your users can use your {{site.data.keyword.Bluemix_notm}} account without creating IBMids. Review the section Setting IAM-specific attributes in {{site.data.keyword.appid_short}} tokens to make sure that your users are correctly onboarded and displayed inside your {{site.data.keyword.Bluemix_notm}} account.
Control access to cloud resources : This tutorial describes how to use Dynamic Rules in Access Groups so that you automate permission assignments based on attributes that your Identity Provider is sending to {{site.data.keyword.Bluemix_notm}} via SAML. The tutorial itself was written for IBMid federation, but the same concept and steps also work with {{site.data.keyword.appid_full_notm}} based federation.
Using {{site.data.keyword.appid_short}} instances to build dynamic rules in access groups : In case you plan to use dynamic rule with {{site.data.keyword.appid_full_notm}}-based federation, make sure to use the correct syntax for the "Identity Provider" setting inside the Dynamic Rule. The section in the link is describing how to build the correct "Identity Provider" identifier.
Setting up {{site.data.keyword.appid_full_notm}} with your Active Directory Federation Service : A description of how to set up an {{site.data.keyword.appid_full_notm}} instance with Microsoft Active Directory. This blog entry is describing the general way how to connect Microsoft Active Directory, but does not make any additional steps to ensure that attributes required by {{site.data.keyword.Bluemix_notm}} IAM are correctly mapped. You must make sure to provide the attributes described here to successfully display user data.
{{site.data.keyword.Bluemix_notm}} Account Single Sign-on by using {{site.data.keyword.appid_full_notm}} and Microsoft Azure AD{: external} : This blog entry shows the whole process of integrating Microsoft Azure Active Directory with {{site.data.keyword.Bluemix_notm}} using {{site.data.keyword.appid_full_notm}}. Check out the documentation to learn more about Identity and Access Management in {{site.data.keyword.Bluemix_notm}}.