Protocols
On this page
OIDC 1.
OpenID Connect (OIDC) and SAML are quite different in how they operate.
With SAML, there is no direct connection between the SingleStore Helios identity system and the IdP.
SAML configuration is done by exchanging XML configuration blobs and configuring, on both sides, the attributes used for first name, last name, and email address.
ODIC is generally easier to set up, but the instructions for any given IdP platform (Okta, Ping, etc.
Currently, IdP-initiated login and logout with SAML are not supported.
Settings Available
The following settings are available in:
General (not specific to OIDC or SAML)
-
JWT Token lifetime for engine access - This is for tokens generated via a browser login for accessing the SingleStore Helios database.
-
A list of email addresses of te format, username@domain or just username, that can bypass the per-domain SSO required setting and log in through the keycloak.
OIDC
-
Allowed Clock drift – useful when the IdP and SingleStore disagree about the current time.
SAML
-
Portal access (minutes) – determine how long should the tokens generated for the SingleStore Helios Portal last.
You will have to re-authenticate when this runs out so a value like 1440 minutes (one day) is reasonable.
Last modified: November 7, 2023