3.5 KiB
OIDC groups authorization
Livebook Teams allows you to control access to your app servers and Livebook apps based on group membership in your OIDC identity provider (IdP).
Livebook version requirement {: .info}
Requires Livebook v0.16 or newer.
Overview
OIDC groups authorization enables you to:
- Restrict access to your Livebook apps and app servers based on group membership
- Control which users can access specific apps using slug prefix filtering
- Integrate seamlessly with your existing OIDC SSO provider (Okta, Microsoft Entra, etc.)
Prerequisites
Before configuring OIDC groups authorization, ensure you have:
-
Configured an OIDC provider in your Livebook Teams organization. If you haven't done this yet, follow the instructions in our OIDC SSO documentation.
-
Configured your OIDC identity provider to include group information in the ID tokens:
Configuration
1. Enable authorization via OIDC SSO groups
To enable authorization via OIDC SSO groups for a deployment group:
- Log in to Livebook Teams
- Navigate to the Deployments panel
- Click Edit on the deployment group where you want to enable authorization
- Go to the IAM section (requires "admin" role in the organization)
- Ensure that Authenticate via Livebook Teams is enabled
- Enable Authorize via OIDC SSO groups
2. Add group authorization
Once authorization is enabled, you can add group access rules:
- Click the Add group button
- Select one of your configured OIDC identity providers
- Enter the name of a group from your identity provider
- Choose the Access type:
- Full access
- Slug prefix access
- Click the Add group button to save the rule
You can add multiple groups with different access types to configure your authorization strategy.
Access types explained
Full access
Users who belong to groups with full access can access:
- The app server admin interface*
- All Livebook apps deployed to this deployment group
*Notice that Admin authentication configs will also apply if configured.
Slug prefix access
Users who belong to groups with slug prefix access can only access Livebook apps whose URL slugs start with the specified prefix.
For example, with the slug prefix "finance-", users can access an app whose slug is "**finance-**budget", but not one with the slug "**hr-**budget".
This allows you to create role-based access control based on your organization's existing group structure.
Testing the Configuration
To verify the configuration is working:
- Sign out of any current Livebook Teams sessions
- Navigate to an app server or Livebook app in the deployment group where you've enabled OIDC groups authorization
- You will be prompted to authenticate through your OIDC provider
- After authentication, the system will check your group membership
- You will only be granted access if you belong to one of the configured groups with appropriate permissions
Troubleshooting
If users are experiencing access issues:
- Verify the group name matches exactly as defined in your IdP (group names are case-sensitive)
- Check that the user is a member of the specified group in your IdP
- Ensure your OIDC provider is properly set up to include group names inside the ID token