Yandex Cloud
Search
Contact UsTry it for free
  • Customer Stories
  • Documentation
  • Blog
  • All Services
  • System Status
  • Marketplace
    • Featured
    • Infrastructure & Network
    • Data Platform
    • AI for business
    • Security
    • DevOps tools
    • Serverless
    • Monitoring & Resources
  • All Solutions
    • By industry
    • By use case
    • Economics and Pricing
    • Security
    • Technical Support
    • Start testing with double trial credits
    • Cloud credits to scale your IT product
    • Gateway to Russia
    • Cloud for Startups
    • Center for Technologies and Society
    • Yandex Cloud Partner program
    • Price calculator
    • Pricing plans
  • Customer Stories
  • Documentation
  • Blog
© 2026 Direct Cursus Technology L.L.C.
Yandex Cloud Stackland
  • What's new
  • Installation
    • All tutorials
    • Installing Stackland on Yandex BareMetal
    • Setting up external access to a pod in a cluster
    • All guides
      • Creating a user
      • Creating a user group
      • Connecting a SAML federation
      • Assigning access permissions
    • Projects
    • Resource model
  • Access management
  • Pricing policy
  • Diagnostics and troubleshooting

In this article:

  • Getting started
  • Creating a SAML federation
  • Setting up group mapping
  • Setting up IdP
  • Test the federation
  • Renewing a certificate
  • What's next
  1. Step-by-step guides
  2. Users and groups
  3. Connecting a SAML federation

Connecting a SAML federation

Written by
Yandex Cloud
Updated at April 8, 2026
  • Getting started
  • Creating a SAML federation
  • Setting up group mapping
  • Setting up IdP
  • Test the federation
  • Renewing a certificate
  • What's next

SAML federation allows users to log in using an external identity provider's (IdP) accounts.

Note

You need cluster administrator rights to set up a SAML federation.

Getting startedGetting started

Prepare the following information about your identity provider:

  • Single Sign-On URL (SSO URL).
  • Issuer ID.
  • PEM certificate to verify the SAML response signature.

Creating a SAML federationCreating a SAML federation

CLI
  1. Create a file named saml-federation.yaml containing a description of the SAML federation:

    apiVersion: iam.stackland.yandex.cloud/v1alpha1
    kind: SAMLFederation
    metadata:
      name: my-federation
    spec:
      description: "SAML Federation for corporate users"
      cookieMaxAge: "43200s"  # 12 hours
      issuer: "https://idp.example.com/realms/my-realm"
      ssoBinding: POST
      ssoUrl: "https://idp.example.com/realms/my-realm/protocol/saml"
      autoCreateAccountOnLogin: true
      caseInsensitiveNameIds: false
      securitySettings:
        encryptedAssertions: false
        forceAuthn: true
      certificates:
        - name: "idp-certificate"
          description: "IdP signing certificate"
          data: |
            -----BEGIN CERTIFICATE-----
            <certificate contents>
            -----END CERTIFICATE-----
    

    Where:

    • name: Federation name.
    • description: Federation description.
    • cookieMaxAge: Session cookie lifetime.
    • issuer: Issuer ID from the IdP settings.
    • ssoUrl: Single Sign-On URL from the IdP settings.
    • autoCreateAccountOnLogin: Create the user automatically on first login.
    • forceAuthn: Require re-authentication at each login.
    • certificates: List of certificates for verification of SAML response signatures.
  2. Apply the configuration:

    kubectl apply -f saml-federation.yaml
    
  3. Check the federation status:

    kubectl get samlfederation my-federation -o yaml
    

Setting up group mappingSetting up group mapping

Group mapping allows you to automatically add federation users to local groups based on their membership in IdP groups.

CLI
  1. Create local groups in Identity and Access Management via the management console or wait for them to be created.

  2. Add group mapping settings to the federation specification:

    apiVersion: iam.stackland.yandex.cloud/v1alpha1
    kind: SAMLFederation
    metadata:
      name: my-federation
    spec:
      # ... other settings ...
      groupMapping:
        enabled: true
        mapping:
          - externalId: idp-admins
            internalName: stackland-cluster-admins
          - externalId: idp-developers
            internalName: developers
    

    Where:

    • externalId: Group name in the IdP.
    • internalName: Local group name in Identity and Access Management.
  3. Apply the changes:

    kubectl apply -f saml-federation.yaml
    
  4. Check the group sync status:

    kubectl get samlfederation my-federation -o jsonpath='{.status.groupMapping}'
    

Setting up IdPSetting up IdP

After creating the federation in Stackland, configure your identity provider:

  1. Get the SAML response URL (ACS URL):

    kubectl get samlfederation my-federation -o jsonpath='{.status.federation.acsDomain}'
    
  2. In you IdP settings:

    • Specify the ACS URL given to you.
    • Set up the sending of the preferred_username attribute in the SAML response.
    • If using group mapping, set up the sending of the user group information.

Test the federationTest the federation

  1. Open the Stackland management console.
  2. On the login page, select login via federation.
  3. Log in using your IdP credentials.
  4. After a successful login, check if the user has appeared in the Identity and Access Management user list.

Renewing a certificateRenewing a certificate

For zero-downtime certificate renewal:

  1. Add the new certificate to the certificates list under a different name.
  2. Apply the changes.
  3. After successful synchronization, remove the old certificate from the list.
  4. Reapply the changes.

What's nextWhat's next

  • Create user groups
  • Issue access permissions

Was the article helpful?

Previous
Creating a user group
Next
Assigning access permissions
© 2026 Direct Cursus Technology L.L.C.