Configure local authentication
As a platform administrator, you can configure local system authentication. With local authentication, users and their passwords are checked against local system accounts.
About this task
A local authenticator is automatically created by the Ansible Automation Platform installation process, and is configured with the specified admin credentials in the inventory file before installation. After successful installation, you can log in to the Ansible Automation Platform using those credentials.
Procedure
What to do next
To control which users are allowed into the Ansible Automation Platform server, and placed into Ansible Automation Platform organizations or teams based on their attributes (such as username and email address) or to what groups they belong, continue to Mapping.
- Configure LDAP authentication
As a platform administrator, you can configure LDAP as the source for account authentication information for Ansible Automation Platform users. - Configure SAML authentication
SAML allows the exchange of authentication and authorization data between an Identity Provider (IdP) and a Service Provider (SP). Ansible Automation Platform is a SAML SP that you can configure to talk with one or more SAML IdPs to authenticate users. - Configure TACACS+ authentication
Terminal Access Controller Access-Control System Plus (TACACS+) provides centralized AAA services (authentication, authorization, and accounting). You can configure Ansible Automation Platform to use TACACS+ as a source for remote authentication and access control. - Configure Microsoft Entra ID authentication
To set up enterprise authentication for Microsoft Entra ID, formerly known as Microsoft Azure Active Directory (AD), follow these steps: - Configure Google OAuth2 authentication
To set up social authentication for Google, you must obtain an OAuth2 key and secret for a web application. To do this, you must first create a project and set it up with Google. - Configure generic OIDC authentication
OpenID Connect (OIDC) uses OAuth 2.0 to verify identity and obtain user info. Unlike SAML’s provider-to-provider trust, OIDC relies on the HTTPS channel to secure tokens. To set up OIDC with Ansible Automation Platform, consult your IdP's documentation for the required credentials. - Configure JWT_Algorithms manually
To resolve the authentication failure, manually provide the list of supported algorithms in the platform gateway configuration. - Enable debugging for enterprise authentication
To further diagnose authentication issues, enable debug logging in platform gateway. - Troubleshoot Generic OIDC scope mismatches
Authentication fails when the Identity Provider (IdP) does not support the default scopes automatically appended by the system. - Configure keycloak authentication
You can configure Ansible Automation Platform to integrate Keycloak to manage user authentication. - Configure GitHub authentication
You can connect GitHub identities to Ansible Automation Platform using OAuth. To set up GitHub authentication, you need to obtain an OAuth2 key and secret by registering your organization-owned application from GitHub by using the registering the new application with GitHub. - Configure GitHub organization authentication
When defining account authentication with either an organization or a team within an organization, you should use the specific organization and team settings. Account authentication can be limited by an organization and by a team within an organization. - Configure GitHub team authentication
To set up social authentication for a GitHub team, you must obtain an OAuth2 key and secret for a web application by using the instructions provided in registering the new application with GitHub. - Configure GitHub enterprise authentication
To set up social authentication for a GitHub enterprise, you must obtain a GitHub Enterprise URL, an API URL, OAuth2 key and secret for a web application. - Configure GitHub enterprise organization authentication
To set up social authentication for a GitHub enterprise organization, you must obtain a GitHub enterprise organization URL, an Organization API URL, an Organization OAuth2 key and secret for a web application. - Configure GitHub enterprise team authentication
To set up social authentication for a GitHub enterprise team, you must obtain a GitHub Enterprise Organization URL, an Organization API URL, an Organization OAuth2 key and secret for a web application. - Configure RADIUS authentication
You can configure Ansible Automation Platform to centrally use RADIUS as a source for authentication information.