Skip to main content

Identity Providers

Stratora supports three authentication methods — local accounts, LDAP / Active Directory, and OIDC single sign-on. You can use any combination: local accounts for service or break-glass access, LDAP for on-prem directory integration, and OIDC for cloud-based SSO.


Local Authentication

Every Stratora installation starts with a built-in admin account. Local accounts authenticate with a username and password stored directly in Stratora.

  • Passwords are hashed with bcrypt (cost factor 12) — plaintext passwords are never stored
  • Minimum password length: 8 characters
  • The default admin account is set to require a password change on first login

Local accounts are managed in Users. For directory-integrated environments, local accounts are typically reserved for emergency or service access.


LDAP / Active Directory

Stratora integrates with LDAP-compatible directories, including Microsoft Active Directory, for centralized authentication. Users sign in with their directory credentials — Stratora never stores their password.

How It Works

  1. User enters their username and password on the Stratora login page
  2. Stratora binds to the directory server using the entered credentials (user principal name format: username@domain)
  3. If the bind succeeds, Stratora fetches the user's email, display name, and group memberships from the directory
  4. The user's Stratora role is determined by matching their directory group memberships against the configured role mappings
  5. A local Stratora user record is created or updated automatically — see Automatic Provisioning
info

Directory credentials are used only for the LDAP bind and are immediately discarded. They are never stored in Stratora's database.

Configuration

Navigate to Administration → Identity Providers → LDAP to configure the connection.

FieldRequiredDescription
Server URLYesLDAP server address — ldap://host:389 or ldaps://host:636
DomainYesActive Directory domain (e.g., corp.example.com)
Search Base DNNoBase DN for user and group searches (e.g., DC=corp,DC=example,DC=com)
Use StartTLSNoUpgrade an LDAP connection to TLS (for ldap:// connections)
Skip TLS VerifyNoSkip certificate validation (for self-signed certificates in lab environments)
Email AttributeNoLDAP attribute for email (default: mail)
Display Name AttributeNoLDAP attribute for display name (default: displayName)
Group AttributeNoLDAP attribute for group memberships (default: memberOf)
EnabledYesMaster toggle to enable or disable LDAP authentication
tip

If you don't configure a Search Base DN, Stratora can still authenticate users via LDAP bind, but it won't be able to fetch email, display name, or group memberships. Configure the search base for full directory integration.

Testing the Connection

Use the Test Connection button to verify that Stratora can reach the directory server. Use Test Authentication to perform a full login test with a real username and password — this also shows which groups were found and what role would be mapped.

Group-to-Role Mapping

Map Active Directory security groups to Stratora roles. Navigate to the Role Mappings section of the LDAP configuration.

FieldDescription
AD Group DNFull distinguished name of the security group
Group NameFriendly display name (optional)
RoleThe Stratora role to assign: Admin, Operator, or Viewer
PriorityNumeric priority — higher numbers take precedence when a user belongs to multiple mapped groups

If a user belongs to multiple mapped groups, the mapping with the highest priority wins. If no groups match, the user is assigned the Viewer role by default.

Roles are re-evaluated on every login, so changes to group memberships in Active Directory take effect the next time the user signs in.


OIDC Single Sign-On

Stratora supports OpenID Connect (OIDC) for single sign-on with cloud identity providers. It has been validated with Microsoft Entra ID (Azure AD) and follows the standard Authorization Code flow with PKCE.

How It Works

  1. User clicks the SSO provider button on the Stratora login page
  2. Stratora redirects the browser to the identity provider's authorization endpoint with a PKCE challenge
  3. User authenticates at the identity provider
  4. The identity provider redirects back to Stratora with an authorization code
  5. Stratora exchanges the code (with the PKCE verifier) for tokens
  6. The ID token is verified using the provider's published signing keys (JWKS)
  7. User claims (email, name, groups) are extracted and a Stratora session is created

Configuration

Navigate to Administration → Identity Providers → OIDC to add a provider.

FieldRequiredDescription
NameYesDisplay name shown on the login page (e.g., "Sign in with Entra")
Issuer URLYesOIDC discovery URL (the /.well-known/openid-configuration endpoint)
Client IDYesApplication (client) ID from your identity provider
Client SecretNoClient secret (encrypted at rest with AES-256-GCM)
ScopesNoOIDC scopes to request (default: openid profile email)
Auto-ProvisionNoAutomatically create Stratora users on first SSO login (default: yes)
Default RoleNoRole for users when no group mapping matches (default: Viewer)
EnabledYesMaster toggle

Microsoft Entra ID–Specific Fields

FieldDescription
Tenant IDEntra tenant ID — enables fetching security groups via Microsoft Graph API
Group ClaimToken claim containing group memberships (default: groups)
Use Graph APIUse Microsoft Graph API for group membership lookups (recommended when users belong to more than 200 groups)

SP-Initiated Login

The standard login flow: the user starts at the Stratora login page and clicks the SSO provider button. Stratora initiates the OIDC authorization request.

IdP-Initiated Login

Configure a Home page URL in your identity provider pointing to https://your-stratora-server/sso. When a user clicks the Stratora app tile in their identity provider's portal:

  • If exactly one OIDC provider is configured, Stratora automatically starts the login flow
  • If multiple providers are configured, the user is shown the login page to choose

Group-to-Role Mapping

Map identity provider groups to Stratora roles, similar to LDAP. Navigate to the Role Mappings section of the OIDC provider configuration.

FieldDescription
Group IDGroup object ID from your identity provider
Group NameFriendly display name (optional)
RoleAdmin, Operator, or Viewer
PriorityHigher numbers take precedence for multi-group users

Use the Fetch Groups button to retrieve available security groups directly from your Entra ID tenant (requires Group.Read.All permission on the app registration).

Testing

Use Test Connection to verify that the issuer URL's discovery document is reachable and valid.


Automatic Provisioning

Both LDAP and OIDC create and update Stratora user accounts automatically.

LDAP Provisioning

  • On first successful LDAP login, a Stratora user is created with the directory username, email, display name, and mapped role
  • On subsequent logins, the email, display name, and role are refreshed from the directory
  • LDAP-provisioned users have their password managed by Active Directory — they cannot change their password in Stratora

OIDC Provisioning

When auto-provision is enabled (the default):

  1. Returning user — if a user with the same OIDC subject ID exists, their profile is updated
  2. Account linking — if a user with the same email exists (e.g., an LDAP-provisioned account), the OIDC identity is linked to the existing account
  3. New user — a new Stratora user is created with the username from the preferred_username claim (or email prefix if not available)

When auto-provision is disabled, only users who already have a Stratora account (matched by OIDC subject ID or email) can sign in via SSO. Unrecognized users see an error.

tip

Account linking allows a smooth transition from LDAP to OIDC. If a user already has an LDAP-provisioned account and then signs in via OIDC with the same email, the accounts are merged automatically.


Authentication Priority

When a user signs in with a username and password on the login page:

  1. Local authentication is attempted first
  2. If local auth fails (or the user has no local password), LDAP authentication is attempted (if enabled)
  3. If both fail, the login is rejected

OIDC authentication is always initiated by clicking the SSO provider button — it does not participate in the username/password flow.