Managing Users and Identity Providers

Workspace > Users with details panel

In the Workspace > Users settings, you can create and manage user accounts and configure identity providers for authentication in Validio.

Configure authentication using:

  • Local identity provider - If you already have a Local identity provider configured, you won't see this option. You can only create one Local identity provider on a Validio installation.
  • SAML identity provider - To allow users to authenticate using Okta, Google, Entra ID, and other SAML 2.0 providers.
❗️

Only Admins can update user accounts.

Add a New User

The Users section lists users created in your Validio system. For each user, it displays information on access privileges, status, associated identities, and creation date.

To create a new user,

  1. In Workspaces > Users, click + Add user.
  2. Under Configure details, fill in the configuration parameters. See User Configuration Parameters.
  3. (Optional) Check Create username and password to manually assign credentials.
  4. Click Create user.

User Configuration Parameters

FieldDescription
Display nameUser identifier in Validio
Full nameUser's first and last name
EmailUser's email address (validated to ensure it matches the standard format)
User statusActive, Pending (has not logged in), or Inactive (cannot log in)
Login typeGuest or Regular. See Login Types
Global roleViewer, Editor, Admin. See Global Roles
Create username and password for this user(Optional) Manual credential assignment

Login Types

Login types provide users the following capabilities:

RoleViewing capabilitiesModifying capabilities
GuestAll, except Identity providers and API KeysNone
RegularBased on assigned RoleBased on assigned Role

Users can log in as Guest using their username and password, even if the Local identity provider is disabled. The Guest login type can be used to provide access to external support users who are not part of your SSO provider.

Global Roles

A user's global role provides the following viewing and modifying capabilities:

RoleViewing capabilitiesModifying capabilities
ViewerAll, except Identity providers and API KeysNone
EditorAll, except Identity providers, and API KeysAll, except Users, Identity providers, and API Keys
AdminAllAll

The users capabilities can be overridden by Team and Namespace assignments. For more information, see About Validio RBAC.

Update and Delete Users

Click the menu to:

  • Update to modify the user details, status, or role.
  • Delete to remove the user.

Add a New Identity Provider

Configuring identity provider with SCIM

The Identity provider section lists identity providers configured on your Validio system. For each identity provider, it displays status, type, and dates for creation and last updated.

To configure a new identity provider,

  1. In Workspaces > Users > Identity Providers, click + Add identity provider.
  2. Under Select type, select either Local identity provider or SAML identity provider (SAML 2.0).
  3. Under Configure details,
    1. Fill in the required parameters. See Identity Provider Configuration Parameters.
    2. (Optional) When configuring a SAML identity provider, check Enable SCIM to enable user and group synchronization via the SCIM protocol.
      1. Copy or save the generated SCIM API Key to configure user provisioning in your identity provider. See SCIM Synchronization.
    3. (Optional) Check Disable this provider to prevent users from authenticating with this identity provider. You can enable it later by updating the identity provider.
  4. Click Create Identity Provider.

Identity Provider Configuration Parameters

The following fields are required when adding or updating an identity provider.

ParameterDescription
NameUnique display name in Validio
Entry point / SSO URLSSO URL or Location URL for the configured identity provider
Entity IDhttps://YOUR-INSTALLATION.validio.io/saml2
CertificateIdentity provider certificate (plain text)

SCIM Synchronization

SCIM, or System for Cross-Domain Identity Management, enables large organizations to automatically provision and de-provision users and groups using external identity providers like Okta or Entra ID, eliminating the need to duplicate work in Validio.

  • Syncing Users and Groups: Users and groups assigned in the identity provider are imported into Validio. For example, pushing the "validio admins" group from Okta will create a corresponding team in Validio, and users in that Okta group will be added to the Validio team.
  • De-provisioning: When a user is removed from the identity provider (like Okta), they are automatically set to inactive in Validio (not deleted). Inactive users cannot log in.
📘

Validio teams have a global role, allowing for easier management of global permissions for groups synced from the identity provider. See Managing Teams.

Configuring SCIM

Prerequisite: In your Validio Workspace Settings, set an Application URL. If the Application URL is not set, you cannot enable SCIM.

In the external identity provider, configure the following:

  • SCIM API key: Enabling SCIM in the Validio SAML identity provider configuration generates a unique SCIM API key that you will configure in the external identity provider as the Bearer authentication token.
  • Base URL: The connector URL used to communicate with your Validio installation. This base URL is formatted: https://YOUR-INSTALLATION.validio.io/scim/v2
    📘

    The name of this setting may be different depending on the identity provider. For example, "SCIM connector base url" in Okta and "Tenant URL" in Entra ID.

  • Provisioning Actions: Select the provisioning actions you want to enable for your SCIM configuration.

Supported SCIM Actions

Validio supports the following types of SCIM provisioning actions configured on the identity provider:

  • Push new users - When you create a new user in your identity provider, sends a SCIM request to add the new user to Validio.
  • Push profile updates - When you change user attributes in your identity provider, sends a SCIM request to update corresponding users in Validio.
  • Push groups - When you assign groups in your identity provider, sends a SCIM request to create Teams with corresponding memberships in Validio.

Update and Delete Identity Providers

Click the menu to:

  • Update to modify Name, enable/disable the provider.
  • Delete to remove the identity provider.