Request A Demo
Back to All Blog Articles

Single Sign-On and Multi Factor Authentication for FlexDeploy

FlexDeploy platform provides easy to configure role-based security model. In my experience, most FlexDeploy customers integrate with corporate directory like Active Directory. This helps eliminate user administration in FlexDeploy. In addition, FlexDeploy customers have also requested support for Single Sign-On (SSO) and Multi Factor Authentication (MFA).

Let’s review these terms first.

  • Single Sign-On – once user authenticates themselves, Single Sign-On solution automatically logs them in to subsequent applications. This allows users to have one single password for all applications and avoids manual login during course of work day.
  • Multi Factory Authentication – provides additional layer of security by requiring one or more piece of information in addition to password. For example, token, one time password, hardware device etc.

Single Sign-On and Multi Factor Authentication can be used together or independently, but when used together it creates convenient and robust login process.

FlexDeploy application can also be protected by such access control solutions. You can accomplish such integrations using options like OpenID Connect, SAML, OAuth etc. You can use external service like Okta, Microsoft Azure AD, and many more or use existing corporate solution. Note that FlexDeploy does not provide SSO and MFA services, rather integrates with such solutions.

Review finer details of such integration at FlexDeploy Documentation. We recommend use of Open ID Connect which is supported by many providers.

Let’s see this in action. Let’s assume we have completed necessary configuration to integrate FlexDeploy with Okta.

What Makes FlexDeploy Different?

This paper compares FlexDeploy to other commercial and open-source DevOps and Application Release Automation solutions.

Read Paper

I will launch application using http://host:port/flexdeploy, but instead of traditional FlexDeploy login page, I am presented with Okta login page.

Let’s go ahead and click Sign In button after entering credential details.

On successful login using Okta, FlexDeploy is launched for specific user. At this point application will behave same as if user was created in local realm.

At this point, if you launch other applications that are controlled using same Single Sign-On solution, you will not have to provide credentials. Also, if you launch FlexDeploy after authenticating against SSO solution, you will not be prompted with login page.

We’d welcome the opportunity to show you how this integration as well as our other robust security features work.

Request Demo

Additional Security Resources:

DevOps and CI/CD Done Right

Out of the Box DevOps Platform for your Business and Open Systems

Related Resources

Unlock the Power of DevOps Compliance for Your Enterprise Software

In today’s fast-paced software development environment, ensuring compliance with regulatory standards and policies is not just a necessity—it’s a strategic ...

Integrating Tricentis Tosca (DEX) with FlexDeploy for Test Automation

Tricentis Tosca is a software testing tool that is used to automate end-to-end testing for software applications. Tricentis Tosca combines ...

Integrating ACCELQ with FlexDeploy for Seamless Test Automation

ACCELQ is a cloud-based, continuous testing platform that offers codeless test automation for web, mobile, API, desktop, and packaged applications. ...

Join DevOps leaders across the globe who receive analysis, tips, and trends in their inbox