Authenticating Studio Users using Single Sign-On
In this topic you will learn how Studio can be configured to authenticate users using single sign-on.
Single sign-on (SSO) is a session and user authentication service that permits a user to use one set of login credentials (e.g., username and password) to access multiple applications. The service authenticates the end user for all the applications the user has been given rights to and eliminates further prompts when the user switches applications during the same session.
SAML-based single sign-on support is available for Video Cloud Studio which gives publishers access to the Studio via SSO through an Identity Provider (IdP) of your choice. Some of the features include:
- Video Cloud Studio supports the SAML 2.0 SSO protocol
- Identity mapping is based on the username (full email address) rather than just a single email domain. This provides more flexibility for publishers who want some users enabled for SSO and others to go through the regular Video Cloud Studio login.
- Once an account and it’s existing users are configured for SSO, new users who are added to the account through the Video Cloud Studio UI will inherit the SSO setup of the user who is adding them
- Video Cloud Studio supports both IdP and Service Provider initiated login for SSO
For more information on having your account enabled for SSO, contact your Account Manager.
Some of the benefits of adding SSO for Video Cloud Studio login include:
- Single Login for all Applications - Remembering multiple usernames and passwords becomes difficult to manage and a headache for IT teams (or account admins of the tools) to deal with. By enabling SSO and adding a Video Cloud Studio login to it, Brightcove account admins no longer have to deal with these issues and users of the tool don’t have to remember a separate username/password for Video Cloud Studio.
- Security & Password Requirements - Enterprises have varying user password requirements, i.e. length, duration and complexity. Using SSO allows Brightcove to support to these requirements without having to change Video Cloud Studio's built-in security management to accommodate each individual set of requirements.
- Disable User Access Quickly & Easily - Single sign-on enables IT to centrally manage users and remove user access as soon as an employee leaves the company. SSO prevents any disgruntled users from modifying or deleting Brightcove media, players, tokens, etc.
Just-in-time user provisioning for SAML isn't currently supported. Users will still need to be added to accounts through the Studio, and permissions/module access control will be configured through the Studio User Administration UI. When new users are added to an account, they will inherit the SSO setup of the user who is adding them.
I know that SAML based SSO is supported but what about two factor (2FA) or multi-factor auth? Is that supported?
No, we don’t have any plans to support 2FA on regular Studio logins at this time. You can enable login for SAML based SSO and add 2FA to your IdP setup, but that would be configured by your IT team on your own IdP.
Are there plans to support other SSO protocols like CAS, Kerberos, GSuite/Google Apps authentication (OAuth 2.0)?
Not at this time.
We have some users on our account that should not go through SSO and others who need to go through SSO. Is this supported?
Yes. SSO is enabled on a per user basis so some users can be enabled for SSO login and others can be enabled for regular Studio login. One thing to note is that there is no way in the Studio user management UI to select which authentication path a user should go through when a new user is being added to the account. Currently the user will inherit whatever auth path that the admin who is adding them is configured for. We do plan to expose an option for selecting this in the Studio at a later date. The workaround for now for mixed authentication flows is to have one admin configured for SSO and one configured for regular Studio login. The admin should log into the appropriate user account when adding new users based on what authentication method they should be setup for.
While we support the flexibility of having different users configured for different identity providers, we also have customers who want one single IdP and every user to always be configured for that single IdP. That configuration is also available.
Is the ability to setup multiple identity providers for users on a single account supported?
Yes. We can set up multiple identity providers for a given org (customer) and we can assign users to either IdP. See the question above regarding the inheritance of auth paths when adding a new user to an account.
Is local login (Studio auth username/password) directly to Brightcove allowed when SAML SSO is turned on for a user?
No. Once a user is enabled for SSO, that is the only way they can authenticate into their account.
Does Brightcove support SAML v2.0 with both browser post based IDP-initiated SSO and SP-initiated SSO?
- IdP initiated login means you can add a signin button/link to your SSO IdP portal and login directly from there.
- SP initiated login means you can type in your username/password into the signin.brightcove.com page and they you be redirected to your IdP to login (if you are not already signed in). Note the password field gets ignored on the VC login page - we only inspect the email address to see if the user is enabled for SSO.
- Brightcove will also provide customers with a special direct domain login URL that will look like this:
Does Brightcove support the use of RelayState parameter in SAMLRequest/SAMLResponse for direct access to video after SSO?
No. After login via SSO, users will always be taken to the Studio Home dashboard.
Does the SSO integration support Single Sign-Out?
What identity providers are supported?
While Brightcove hasn’t tested with all SSO Identity Providers, we are confident that as long as your IdP supports SAML 2.0, there shouldn't be any problems. Some of the common ones we’ve talked to customers about include: Okta, Ping Federated, Ping Identity, Microsoft Active Directory, OneLogin, and Auth0.