Single sign-on is only supported when you are using your own Galileo cluster. This is not available in the free version of Galileo, or a paid version running on app.galileo.ai.
-
Follow this guide to set up your OAuth credentials
- User Type is
Internal
- Scopes are
.../auth/userinfo.profile
andopenid
- Authorized domains is your domain for Galileo console
- User Type is
-
When creating a new client ID, set:
- type to
Web application
- Authorized redirect URIs to
https://{CONSOLE_URL}/api/auth/callback/google
, replacing{CONSOLE_URL}
with the URL of your Galileo console
- type to
- Share your Client ID and Client Secret with Galileo
Microsoft Entra ID
- Follow this guide to create a new application
-
Under Redirect URI, set:
- The type to Web
- The URI to
https://{CONSOLE_URL}/api/auth/callback/azure-ad
, replacing{CONSOLE_URL}
with the URL of your Galileo console
- Go to Token configuration page, Add Optional Claim, choose the ID token and email claim. Ensure each user has their email set in the Contact Information properties. Galileo will use this email as the account.
- Go to the Certificates & secrets page, select New Client Secret, and create a new secret
- Share the Tenant ID, Client ID, and Client Secret with Galileo
Okta
- Follow this guide to create a new application
-
Select:
- OIDC - OpenID Connect as the Sign-in method
- Web Application as the application type
- Authorization Code as the Grant Type
-
Set Sign-in redirect URIs to
https://{CONSOLE_URL}/api/auth/callback/okta
, and Sign-out redirect URIs tohttps://{CONSOLE_URL}
, replacing{CONSOLE_URL}
with the URL of your Galileo console -
Share the Issuer URL, Client ID, and Client Secret with Galileo. You can find the Issuer URL in Security -> API in the admin panel. The audience should be
api://default
.
PingFederate
- Follow this guide to create an application
- Set the Application Type to OIDC Web App
-
Go to the app configuration page, and set the Redirect URIs to
https://{CONSOLE_URL}/api/auth/callback/custom
, replacing{CONSOLE_URL}
with the URL of your Galileo console - Share the Environment ID, Client ID, and Client Secret with Galileo
Custom OIDC Provider
-
Create an application/client with OIDC as the protocol, Web Application as the application type, and Authorization Code as the Grant Type
- Ensure an email claim is returned as part of the ID Token
-
Set Sign-in redirect URIs to
https://{CONSOLE_URL}/api/auth/callback/custom
, Sign-out redirect URIs tohttps://{CONSOLE_URL}
, and Web origins tohttps://{CONSOLE_URL}
, replacing{CONSOLE_URL}
with the URL of your Galileo console - Create a Client Secret
-
Share all these with Galileo:
CLIENT_ID
CLIENT_SECRET
TOKEN_URL
(e.g.https://{BASE_URL}/token
)USERINFO_URL
(e.g.https://{BASE_URL}/userinfo
)ISSUER
JWKS_URL
(e.g.https://{BASE_URL}/certs
)AUTHORIZATION_URL
(e.g.https://{BASE_URL}/auth?response_type=code
)