We support a variety of Identity Providers to authenticate users in hoop.dev. In this guide you will find the IDPs we had success integrating with but as due to how we integrate with them using OIDC standards, you can try to integrate with any OIDC compliant IDP.Documentation Index
Fetch the complete documentation index at: https://hoopdev-docs-concepts-gaps-and-organization.mintlify.app/llms.txt
Use this file to discover all available pages before exploring further.
Local Authentication
Auth0
Okta
Azure
Jump Cloud
AWS Cognito
Users
Users are active and assigned to the default organization when they signup. A user could be set to an inactive state preventing it from accessing the platform, however it’s recommended to manage the state of users in the identity provider.- The
subclaim is used as the main identifier of the user in the platform. - The profile of the user is derived from the id_token claims
emailandname.
Groups
Groups allows defining who may access or interact with certain resources.- For connection resources it’s possible to define which groups has access to a specific connection, this is enforced when the Access Control feature is enabled.
- For access requests, it’s possible to define which groups are allowed to approve an execution, this is enforced when the Access Requests feature is enabled.
Roles
- The admin group is a special role that grants full access to all resources
- The auditor group grants the auditor role that gives read only access to session resources
Configuration Page
This feature is available beginning with version
1.38.12