SSO Access
Edit on GitHubWhat is SSO
Single Sign-On (SSO) is an authentication mechanism that allows users to sign in once and access multiple applications without re-authenticating for each service (RMQ, Jenkins).
SSO can be integrated with an external organizational identity provider (IdP), such as a corporate directory service, enabling centralized user management and access control.
This approach improves security by reducing password reuse and enhances the user experience by minimizing repeated logins.
How SSO improves the user experience
SSO makes accessing services easier, faster, and more secure by providing:
- Centralized authentication through your company’s identity provider, or via users managed in our identity system
- Fewer passwords to remember, reducing friction and support overhead
- A faster and smoother login experience across all connected services
- Simplified user lifecycle management (onboarding, updates, and offboarding)
- Stronger security and compliance through consistent authentication policies
- Easy integration for enterprise organizations that use their own identity provider
How to access applications with an SSO user
You will need an SSO user, User Management SSO describes how to get one.
AWS access
AWS Management Console
- Click on AWS Console service in CloudHub which will lead to the SSO login page.
- Log in using your SSO user credentials.
- After successful authentication, you will be redirected to the AWS Management Console with access to your environment services.
AWS CLI
To access AWS services via the AWS CLI with your SSO credentials, see Connecting to AWS CLI with an SSO user.
VPN access
VPN access uses short-lived sessions for improved security. To start a VPN session, you must go through the SSO login process and provide an MFA code.
- Open your VPN client and initiate a connection to the target environment.
- When prompted, log in using your SSO user credentials.
- Provide your MFA code to complete authentication.
- Once authenticated, the VPN session is established. The session is short-lived and will expire after a period of inactivity or at a set time limit.
To reconnect after a session expires, repeat the SSO login and MFA steps.
RabbitMQ access
For RabbitMQ, the user must have VPN enabled for the specific environment they want to access. Once the VPN is enabled:
- Click on RabbitMQ service in CloudHub which will lead to the RabbitMQ login page.
- Click the Log in button.
- You will be redirected to the SSO login form.
- Provide your SSO user credentials and log in.
If you previously logged in to VPN or any other application in the same browser, for example Jenkins, log in happens automatically, because you are using the same SSO user.
Jenkins access
For Jenkins, the user must have VPN enabled for the specific environment they want to access. Once the VPN is enabled:
- Click on Jenkins service in CloudHub which will lead to the SSO login page.
- Provide your SSO user credentials and log in.
- You will be redirected to the Jenkins dashboard.
If you previously logged in to VPN or any other application in the same browser, for example RabbitMQ, log in happens automatically, because you are using the same SSO user.
Keycloak access
Keycloak is where you can view and edit your SSO user profile (editing options are limited).
- Click on Keycloak service in CloudHub which will lead to the SSO login page.
- Provide your SSO user credentials and log in.
- You will be redirected to Keycloak where you can change your username and password.
If you previously logged in to VPN or any other application in the same browser, for example RabbitMQ, log in happens automatically, because you are using the same SSO user.
External IdP connection
As an alternative or additional authentication method, we support connection to external Identity Providers (IdPs) that use SAML or OpenID Connect (OIDC).
Benefits of using an external IdP:
- You can apply and enforce your own authentication policies.
- You can manage user assignments and permissions to all supported services directly through your IdP without creating any Self‑Service requests.
- Centralized lifecycle management of users (onboarding/offboarding handled entirely in your IdP).
- Stronger security posture through enterprise-grade features such as MFA, conditional access, and device or network policies.
- Seamless user experience with a single set of corporate credentials.
- Reduced administrative overhead by eliminating duplicate user management.
- Better compliance and auditing through centralized identity logs and policies.
- Faster and automated access provisioning as your organization scales.
- Improved security posture by not storing or processing passwords within our platform.
Such users cannot be created or managed via CloudHub User Management (SSO) page. For configuration details, contact our support team.
Next steps
Thank you!
For submitting the form