K2cloud Identity Federation Services - Integration Overview

Abstract

This document explains how to integrate customer Identity Providers (IdPs) such as Microsoft Entra ID, Okta, PingFederate, and other SAML-compliant platforms with K2cloud’s CyberArk Identity Federation Service to enable Single Sign-On (SSO) and role-based access control. It describes the exchange of metadata, domain, and group information required for setup, and how customer-managed security groups map to Fabric roles via K2cloud’s federation service. Step-by-step instructions are provided for each supported IdP, ensuring that user authentication and authorization remain centrally managed by the customer’s IdP while K2view enforces secure access to Spaces, Projects, and K2cloud Orchestrator resources.

For details on how roles and permissions are defined and applied within K2cloud, see the companion article K2cloud Roles and Identity Mapping.

Keywords

Identity Federation, Identity Provider (IdP), SAML, Single Sign-On (SSO), Role-Based Access Control (RBAC), Metadata Exchange, Microsoft Entra ID, Okta, PingFederate, CyberArk, K2cloud Directory, Security Groups, Fabric Roles, Domain Mapping, Attribute Claims, Orchestrator, Spaces (K2view), Federated Authentication, Partner Metadata, Federation Setup Instructions

K2cloud Identity Federation Services - Integration Overview

Abstract

This document explains how to integrate customer Identity Providers (IdPs) such as Microsoft Entra ID, Okta, PingFederate, and other SAML-compliant platforms with K2cloud’s CyberArk Identity Federation Service to enable Single Sign-On (SSO) and role-based access control. It describes the exchange of metadata, domain, and group information required for setup, and how customer-managed security groups map to Fabric roles via K2cloud’s federation service. Step-by-step instructions are provided for each supported IdP, ensuring that user authentication and authorization remain centrally managed by the customer’s IdP while K2view enforces secure access to Spaces, Projects, and K2cloud Orchestrator resources.

For details on how roles and permissions are defined and applied within K2cloud, see the companion article K2cloud Roles and Identity Mapping.

Keywords

Identity Federation, Identity Provider (IdP), SAML, Single Sign-On (SSO), Role-Based Access Control (RBAC), Metadata Exchange, Microsoft Entra ID, Okta, PingFederate, CyberArk, K2cloud Directory, Security Groups, Fabric Roles, Domain Mapping, Attribute Claims, Orchestrator, Spaces (K2view), Federated Authentication, Partner Metadata, Federation Setup Instructions