Skip to main content

Authentication

Parcelvoy comes with a few different types of authentication out of the box:

  • Basic
  • SAML
  • OpenID
  • Google

Whereas a lot of platforms will gate SSO as a luxury feature and charge extra for it (this is known as the SSO Tax) we opted to go the opposite direction and lean in completely to SSO to make sure you understand that Parcelvoy takes your security seriously. SSO is not something that only Enterprise companies should have, but should be available at every level.

Basic

Right out of the gate Parcelvoy is setup to use a simple Basic auth that allows for a single user that can be set inside of the environment variables. This is a limited form of auth as it does not allow for multiple users and is largely meant for evaluation purposes.

To change the credentials for basic auth, modify the following environment variables and restart your Parcelvoy instance.

AUTH_BASIC_NAME=Login
AUTH_BASIC_USERNAME=parcelvoy
AUTH_BASIC_PASSWORD=password

OpenID

Config

keytyperequired
AUTH_DRIVER'openid'true
AUTH_OPENID_NAMEstringfalse
AUTH_OPENID_ISSUER_URLstringtrue
AUTH_OPENID_CLIENT_IDstringtrue
AUTH_OPENID_CLIENT_SECRETstringtrue
AUTH_OPENID_REDIRECT_URIstringtrue
AUTH_OPENID_DOMAIN_WHITELISTstringtrue
AUTH_OPENID_RESPONSE_TYPESstringfalse

SAML

Config

keytyperequired
AUTH_DRIVER'saml'true
AUTH_SAML_NAMEstringfalse
AUTH_SAML_CALLBACK_URLstringtrue
AUTH_SAML_ENTRY_POINT_URLstringtrue
AUTH_SAML_ISSUERstringtrue
AUTH_SAML_CERTstringtrue
AUTH_SAML_IS_AUTHN_SIGNEDbooleanfalse

Google Workspace

You can utilize either SAML or OpenID to connect to your Google Account. We'll be highlighting how to setup SAML as it is slightly easier than OpenID to configure.

  1. Open the admin console for Google Workspace (https://admin.google.com)
  2. Navigate to Apps -> Web and mobile apps
  3. Click Add app and from the dropdown select Add custom SAML app
  4. Enter an app name and select an optional logo and continue to the next step
  5. Copy the SSO URL and the Certificate, you'll need them later. Hit Continue.
  6. Under Service Provider Details enter the following:
    • ACS URL: YOUR_DOMAIN.com/api/auth/login/saml/callback
    • Entity ID: YOUR_DOMAIN.com/api/auth/login/saml/callback
    • Name ID Format: EMAIL
    • Name ID: Basic Information > Primary Email
  7. Hit Continue.
  8. Under SAML attribute mapping you can map the following attributes:
    • First name: first_name
    • Last name: last_name
  9. Hit Finish to save.
  10. Navigate to your new SAML configuration and select User Access. Make sure to turn this on for the groups you would like to have access.
  11. Open your IDE. In your environment variables add or replace the following:
AUTH_DRIVER=basic
AUTH_SAML_CALLBACK_URL=// The domain from above
AUTH_SAML_ENTRY_POINT_URL=// The SSO URL you previously copied
AUTH_SAML_ISSUER=// The entity ID from above
AUTH_SAML_CERT=// The certificate you previously copied
AUTH_SAML_IS_AUTHN_SIGNED=false
  1. Restart your instance to make sure the latest changes are propogated. It can take up to an hour for a new Google SAML app to go live, check back in if it doesn't work immediately.