Managing Users and Identity Providers

Create and manage user accounts and configure identity providers for authentication in Validio.

The Users settings page in Workspace > Users lets you create and manage user accounts and configure identity providers for authentication in Validio. For an overview of how users, teams, namespaces, and roles work together, see About Validio RBAC.

Workspace > Users and Identity Providers

On this page:

  • Manage Users — Create user accounts, assign login types and global roles, and update or delete users.
  • Manage Identity Providers — Configure Local or SAML 2.0 identity providers, set up SCIM synchronization, and update or delete providers.

Manage Users

The Users section lists users created in your Validio system. For each user, it displays information on access privileges, status, associated identities, and creation date. You can also see more configuration information for individual users by clicking on a User to open the details side panel.

Workspace > Users

Login Types

Login types provide users the following capabilities:

RoleViewing capabilitiesModifying capabilities
GuestAllNone
RegularBased on assigned RoleBased on assigned Role

Users can log in as Guest using their username and password, even if the Local identity provider is disabled. The Guest login type can be used to provide access to external support users who are not part of your SSO provider.

Global Roles

A user's global role provides the following viewing and modifying capabilities:

Global RoleViewing capabilitiesModifying capabilities
AdminAllAll
EditorAllCatalog assets, Saved searches, Lineage, Tags
ViewerAllNone
CustomUser-definedUser-defined

The users capabilities can be overridden by Team and Namespace assignments. For more information, see Managing Roles.

You can also set a default user role to automatically assign to all new users added to your workspace. For more information, see Configuring Global Settings.

Search, Filter, and Sort

You can use the following controls to quickly find users in the list:

  • Search: Type keywords to match against the user's display name.
  • Global role filter: Filter the list by one or more global roles (Admin, Editor, Viewer, or Custom). You can filter for Any of (matches users with any selected role) or None of (excludes users with the selected roles).
  • Sort: Select a field name to sort the list in ascending or descending order.

Add a New User

To create a new user,

  1. In Workspaces > Users, click + Add user.

  2. Under Configure details, fill in the configuration parameters:

    FieldDescription
    Display nameUser identifier in Validio
    Full nameUser's first and last name
    EmailUser's email address (validated to ensure it matches the standard format)
    User statusActive, Pending (has not logged in), or Inactive (cannot log in)
    Login typeGuest or Regular. See Login Types
    Global roleViewer, Editor, Admin, or a Custom role. See Global Roles
  3. (Optional) Check Create username and password to manually assign credentials.

  4. Click Create user.

Update and Delete Users

Click the menu and select:

  • Update to modify the user details, status, or role.
  • Delete to remove the user.

To make bulk updates, you can select more than one user. Bulk actions include

  • Update role: Assign a new role to the selected users.
  • Remove: Delete the selected users.

Manage Identity Providers

The Identity provider (IdP) section lists all IdPs configured on your Validio system. For each provider it displays status, type, and dates for creation and last updated. You can also see more configuration information for individual IdPs by clicking on a row to open its details side panel.

Configuring identity provider with SCIM

For provider-specific setup instructions, see SAML SSO.

Add a New Identity Provider

To configure a new identity provider,

  1. In Workspaces > Users > Identity Providers, click + Add identity provider.

  2. Under Select type, select either Local identity provider or SAML identity provider (SAML 2.0).

  3. Under Configure details, fill in the required parameters:

    ParameterDescription
    NameUnique display name in Validio
    Entry point / SSO URLSSO URL or Location URL for the configured identity provider
    Entity IDhttps://YOUR-INSTALLATION.validio.io/saml2
    CertificateIdentity provider certificate (plain text)
  4. Under Settings,

    • (Optional) When configuring a SAML identity provider, check Enable SCIM to enable user and group synchronization via the SCIM protocol.

      • Copy or save the generated SCIM API Key to configure user provisioning in your identity provider. See SCIM Synchronization.
    • (Optional) Check Disable this provider to prevent users from authenticating with this identity provider. You can enable it later by updating the identity provider.

  5. Click Create Identity Provider.

SCIM Synchronization

SCIM, or System for Cross-Domain Identity Management, enables large organizations to automatically provision and de-provision users and groups using external identity providers like Okta or Entra ID, eliminating the need to duplicate work in Validio.

  • Syncing Users and Groups: Users and groups assigned in the identity provider are imported into Validio. For example, pushing the "validio admins" group from Okta will create a corresponding team in Validio, and users in that Okta group will be added to the Validio team.
  • De-provisioning: When a user is removed from the identity provider (like Okta), they are automatically set to inactive in Validio (not deleted). Inactive users cannot log in.
📘

Validio teams have a global role, allowing for easier management of global permissions for groups synced from the identity provider. See Managing Teams.

Configuring SCIM

Prerequisite: In your Validio Workspace Settings, set an Application URL. If the Application URL is not set, you cannot enable SCIM.

In the external identity provider, configure the following:

  • SCIM API key: Enabling SCIM in the Validio SAML identity provider configuration generates a unique SCIM API key that you will configure in the external identity provider as the Bearer authentication token.
  • Base URL: The connector URL used to communicate with your Validio installation. This base URL is formatted: https://YOUR-INSTALLATION.validio.io/scim/v2
    📘

    The name of this setting may be different depending on the identity provider. For example, "SCIM connector base url" in Okta and "Tenant URL" in Entra ID.

  • Provisioning Actions: Select the provisioning actions you want to enable for your SCIM configuration.

Supported SCIM Actions

Validio supports the following types of SCIM provisioning actions configured on the identity provider:

  • Push new users: When you create a new user in your identity provider, sends a SCIM request to add the new user to Validio.
  • Push profile updates: When you change user attributes in your identity provider, sends a SCIM request to update corresponding users in Validio.
  • Push groups: When you assign groups in your identity provider, sends a SCIM request to create Teams with corresponding memberships in Validio.

Update and Delete Identity Providers

Click the menu and select:

  • Update to modify Name, and enable/disable the provider.
  • Delete to remove the identity provider. This option is only available when you have more than one IdP configured in your workspace.