With SAML (Security Assertion Markup Language) enabled, you can authenticate users in Cube Cloud through Okta, allowing your team to access Cube Cloud using single sign-on.Documentation Index
Fetch the complete documentation index at: https://docs.cube.dev/llms.txt
Use this file to discover all available pages before exploring further.
Available on Enterprise plan.
Prerequisites
Before proceeding, ensure you have the following:- Admin permissions in Cube Cloud.
- Account administrator permissions in your Okta organization to access the Admin Console and create SAML integrations.
Enable SAML in Cube Cloud
First, enable SAML authentication in Cube Cloud:- In Cube Cloud, navigate to Admin → Settings.
- On the Authentication & SSO tab, enable the SAML toggle.
- Take note of the Single Sign-On URL and Audience values — you’ll need them when configuring the SAML integration in Okta.
Create a SAML integration in Okta
- Log in to your Okta organization as an administrator, then navigate to the Admin Console by clicking Admin in the top-right corner.
- Click Applications → Applications from the navigation on the left, then click Create App Integration.
- Select SAML 2.0 and click Next.
- Enter a name for your application and click Next.
- Enter the following values in the SAML Settings section:
- Single sign on URL — Use the Single Sign-On URL value from Cube Cloud.
- Audience URI (SP Entity ID) — Use the Audience value from Cube Cloud.
- Click Next to go to the Feedback screen, fill in any necessary details and click Finish.
Configure attribute statements in Okta
After the application is created, configure attribute statements to map user attributes from Okta to Cube Cloud:- In your SAML app integration, go to the Sign On tab.
- Scroll down to the Attribute statements section.
-
Click Add expression and create the following entries:
Name Expression emailuser.profile.emailnameuser.profile.firstName -
If you plan to map Cube roles based on Okta group membership (see
Map roles by group below), also add a Group
Attribute Statement. Scroll to the Group Attribute Statements
section and add:
Adjust the filter to scope which groups Okta sends — e.g. Starts with
Name Filter groupsMatches regex .*cube-to limit the assertion to Cube-related groups. The attribute name must match the Groups attribute value configured in Cube Cloud (defaults togroups).
Retrieve SAML details from Okta
Next, retrieve the values you’ll need to complete the configuration in Cube Cloud:- In your SAML app integration, go to the Sign On tab.
- In the sidebar, click View SAML setup instructions.
- Take note of the following values from the setup instructions page:
- Identity Provider Single Sign-On URL
- Identity Provider Issuer
- X.509 Certificate
Complete configuration in Cube Cloud
Return to the SAML configuration page in Cube Cloud and provide the identity provider details:- Entity ID / Issuer — Use the Identity Provider Issuer value from Okta.
- SSO (Sign on) URL — Use the Identity Provider Single Sign-On URL value from Okta.
- Certificate — Paste the X.509 Certificate from Okta.
- Auto-provision new users — When enabled, users are automatically created in Cube on their first login via this SAML provider. Enable this if you want to provision users only when they first access Cube and you are not using SCIM provisioning. New users receive the Viewer role by default; see Default role for new users to choose a different role.
Default role for new users
Auto-provisioned users — both via SAML and via SCIM — receive the Viewer role by default. To assign a different role, expand the Advanced section of the SAML configuration form and pick from Default role for new users:- Developer, Explorer, or Viewer — Cube’s default roles.
- Any custom role defined in your account, listed below the divider.
Admin status is not assignable through this picker — Admin is controlled
separately. To grant admin permissions, update the user’s role manually
under Admin → Users.
Map roles by group
For finer-grained role assignment, enable Map roles by group in the Advanced Settings section to assign Cube Cloud roles based on a user’s Okta group memberships. To configure group-based role mapping:- Make sure Okta sends a group attribute statement on the SAML assertion. See step 4 of Configure attribute statements in Okta.
- In the SAML configuration form in Cube Cloud, expand Advanced Settings.
- (Optional) Under SAML attribute customization, set the Groups
attribute to the name of the SAML attribute you configured in Okta.
Defaults to
groups. - Enable the Map roles by group toggle.
- Click Add group mapping and create one entry per group you want to
map:
- IdP group name — the Okta group display name exactly as it appears in the SAML assertion (case-insensitive).
- Cube Cloud role — pick a default or custom role.
Test SAML authentication
- Copy the Single Sign-On URL from the SAML configuration page in Cube Cloud.
- Open a new browser tab and paste the URL into the address bar, then press Enter.
- You should be redirected to Okta to log in. After a successful login, you should be redirected back to Cube Cloud.