With SAML (Security Assertion Markup Language) enabled, you can authenticate users in Cube Cloud through Okta, allowing your team to access Cube Cloud using single sign-on.Documentation Index
Fetch the complete documentation index at: https://cubed3-docs-cub-2416-update-semantic-snowflake-semantic-vie.mintlify.app/llms.txt
Use this file to discover all available pages before exploring further.
Available on Enterprise plan.
Prerequisites
Before proceeding, ensure you have the following:- Admin permissions in Cube Cloud.
- Account administrator permissions in your Okta organization to access the Admin Console and create SAML integrations.
Enable SAML in Cube Cloud
First, enable SAML authentication in Cube Cloud:- In Cube Cloud, navigate to Admin → Settings.
- On the Authentication & SSO tab, enable the SAML toggle.
- Take note of the Single Sign-On URL and Audience values — you’ll need them when configuring the SAML integration in Okta.
Create a SAML integration in Okta
- Log in to your Okta organization as an administrator, then navigate to the Admin Console by clicking Admin in the top-right corner.
- Click Applications → Applications from the navigation on the left, then click Create App Integration.
- Select SAML 2.0 and click Next.
- Enter a name for your application and click Next.
- Enter the following values in the SAML Settings section:
- Single sign on URL — Use the Single Sign-On URL value from Cube Cloud.
- Audience URI (SP Entity ID) — Use the Audience value from Cube Cloud.
- Click Next to go to the Feedback screen, fill in any necessary details and click Finish.
Configure attribute statements in Okta
After the application is created, configure attribute statements to map user attributes from Okta to Cube Cloud:- In your SAML app integration, go to the Sign On tab.
- Scroll down to the Attribute statements section.
- Click Add expression and create the following entries:
| Name | Expression |
|---|---|
email | user.profile.email |
name | user.profile.firstName |
Retrieve SAML details from Okta
Next, retrieve the values you’ll need to complete the configuration in Cube Cloud:- In your SAML app integration, go to the Sign On tab.
- In the sidebar, click View SAML setup instructions.
- Take note of the following values from the setup instructions page:
- Identity Provider Single Sign-On URL
- Identity Provider Issuer
- X.509 Certificate
Complete configuration in Cube Cloud
Return to the SAML configuration page in Cube Cloud and provide the identity provider details:- Entity ID / Issuer — Use the Identity Provider Issuer value from Okta.
- SSO (Sign on) URL — Use the Identity Provider Single Sign-On URL value from Okta.
- Certificate — Paste the X.509 Certificate from Okta.
- Auto-provision new users — When enabled, users are automatically created in Cube on their first login via this SAML provider. Enable this if you want to provision users only when they first access Cube and you are not using SCIM provisioning. New users receive the Viewer role by default; see Default role for new users to choose a different role.
Default role for new users
Auto-provisioned users — both via SAML and via SCIM — receive the Viewer role by default. To assign a different role, expand the Advanced section of the SAML configuration form and pick from Default role for new users:- Developer, Explorer, or Viewer — Cube’s default roles.
- Any custom role defined in your account, listed below the divider.
rolesMap).
Admin status is not assignable through this picker — Admin is controlled
separately. To grant admin permissions, update the user’s role manually
under Admin → Users.
Test SAML authentication
- Copy the Single Sign-On URL from the SAML configuration page in Cube Cloud.
- Open a new browser tab and paste the URL into the address bar, then press Enter.
- You should be redirected to Okta to log in. After a successful login, you should be redirected back to Cube Cloud.