Authentication
Parcelvoy comes with a few different types of authentication out of the box:
- Basic
- SAML
- OpenID
Whereas a lot of platforms will gate SSO as a luxury feature and charge extra for it (this is known as the SSO Tax) we opted to go the opposite direction and lean in completely to SSO to make sure you understand that Parcelvoy takes your security seriously. SSO is not something that only Enterprise companies should have, but should be available at every level.
Basic
Right out of the gate Parcelvoy is setup to use a simple Basic auth that allows for a single user that can be set inside of the environment variables. This is a limited form of auth as it does not allow for multiple users and is largely meant for evaluation purposes.
To change the credentials for basic auth, modify the following environment variables and restart your Parcelvoy instance.
AUTH_BASIC_NAME=Login
AUTH_BASIC_USERNAME=parcelvoy
AUTH_BASIC_PASSWORD=password
OpenID
Config
key | type | required |
---|---|---|
AUTH_DRIVER | 'openid' | true |
AUTH_OPENID_NAME | string | false |
AUTH_OPENID_ISSUER_URL | string | true |
AUTH_OPENID_CLIENT_ID | string | true |
AUTH_OPENID_CLIENT_SECRET | string | true |
AUTH_OPENID_REDIRECT_URI | string | true |
AUTH_OPENID_DOMAIN_WHITELIST | string | true |
AUTH_OPENID_RESPONSE_TYPES | string | false |
SAML
Config
key | type | required |
---|---|---|
AUTH_DRIVER | 'saml' | true |
AUTH_SAML_NAME | string | false |
AUTH_SAML_CALLBACK_URL | string | true |
AUTH_SAML_ENTRY_POINT_URL | string | true |
AUTH_SAML_ISSUER | string | true |
AUTH_SAML_CERT | string | true |
AUTH_SAML_IS_AUTHN_SIGNED | boolean | false |
Google Workspace
You can utilize either SAML or OpenID to connect to your Google Account. We'll be highlighting how to setup SAML as it is slightly easier than OpenID to configure.
- Open the admin console for Google Workspace (https://admin.google.com)
- Navigate to Apps -> Web and mobile apps
- Click
Add app
and from the dropdown selectAdd custom SAML app
- Enter an app name and select an optional logo and continue to the next step
- Copy the SSO URL and the Certificate, you'll need them later. Hit Continue.
- Under Service Provider Details enter the following:
- ACS URL:
YOUR_DOMAIN.com/api/auth/login/saml/callback
- Entity ID:
YOUR_DOMAIN.com/api/auth/login/saml/callback
- Name ID Format:
EMAIL
- Name ID:
Basic Information > Primary Email
- ACS URL:
- Hit Continue.
- Under SAML attribute mapping you can map the following attributes:
- First name:
first_name
- Last name:
last_name
- First name:
- Hit Finish to save.
- Navigate to your new SAML configuration and select User Access. Make sure to turn this on for the groups you would like to have access.
- Open your IDE. In your environment variables add or replace the following:
AUTH_DRIVER=basic
AUTH_SAML_CALLBACK_URL=// The domain from above
AUTH_SAML_ENTRY_POINT_URL=// The SSO URL you previously copied
AUTH_SAML_ISSUER=// The entity ID from above
AUTH_SAML_CERT=// The certificate you previously copied
AUTH_SAML_IS_AUTHN_SIGNED=false
- Restart your instance to make sure the latest changes are propogated. It can take up to an hour for a new Google SAML app to go live, check back in if it doesn't work immediately.