{{ page.title }}

{{ page.description }}

Single sign-on (SSO) is a session and user authentication service that permits a user to use one set of login credentials (e.g., username and password) to access multiple applications. The service authenticates the end user for all the applications the user has been given rights to and eliminates further prompts when the user switches applications during the same session.

SAML-based single sign-on support is available for {{ site.product }} which gives publishers access to the Studio via SSO through an Identity Provider (IdP) of your choice. Some of the features include:

For more information on having your account enabled for SSO, contact your Customer Success Manager.

Benefits

Some of the benefits of adding SSO for {{ site.product }} login include:

Limitations

FAQ

I know that SAML based SSO is supported but what about two factor (2FA) or multi-factor auth? Is that supported?

No, we don’t have any plans to support 2FA on regular Studio logins at this time. You can enable login for SAML based SSO and add 2FA to your IdP setup, but that would be configured by your IT team on your own IdP.

Are there plans to support other SSO protocols like CAS or Kerberos?

Not at this time.

We have some users on our account that should not go through SSO and others who need to go through SSO. Is this supported?

Yes. SSO is enabled on a per user basis so some users can be enabled for SSO login and others can be enabled for regular Studio login. One thing to note is that there is no way in the Studio user management UI to select which authentication path a user should go through when a new user is being added to the account. Currently the user will inherit whatever auth path that the admin who is adding them is configured for. We do plan to expose an option for selecting this in the Studio at a later date. The workaround for now for mixed authentication flows is to have one admin configured for SSO and one configured for regular Studio login. The admin should log into the appropriate user account when adding new users based on what authentication method they should be setup for.

While we support the flexibility of having different users configured for different identity providers, we also have customers who want one single IdP and every user to always be configured for that single IdP. That configuration is also available.

Is the ability to setup multiple identity providers for users on a single account supported?

Yes. We can set up multiple identity providers for a given org (customer) and we can assign users to either IdP. See the question above regarding the inheritance of auth paths when adding a new user to an account.

Is local login (Studio auth username/password) directly to Brightcove allowed when SAML SSO is turned on for a user?

No. Once a user is enabled for SSO, that is the only way they can authenticate into their account.

Does Brightcove support SAML v2.0 with SP-initiated SSO?

Yes

  • SP-initiated login is supported via a special direct domain login URL that will look like this:
    https://signin.brightcove.com/login/ext/saml?behavior=xxxxxxxxx
  • Additionally, you can also visit signin.brightcove.com to log in. Upon entering the username on the Brightcove sign-in page, it will be checked, and if the user is SSO-enabled and not already signed in, the user will be redirected to your IDP for authentication.
Does Brightcove support the use of RelayState parameter in SAMLRequest/SAMLResponse for direct access to video after SSO?

No. After login via SSO, users will always be taken to the Studio Home dashboard.

Does the SSO integration support Single Sign-Out?

No.

What identity providers are supported?

While Brightcove hasn’t tested with all SSO Identity Providers, we are confident that as long as your IdP supports SAML 2.0, there shouldn't be any problems. Some of the common ones we’ve talked to customers about include: Okta, Ping Federated, Ping Identity, Microsoft Active Directory, OneLogin, and Auth0.