Skip to main content

Identity Provider Integration

Overview

Identity provider integrations sync your employee directory and enable single sign-on (SSO). This is typically the first integration to set up.

Supported Providers

info

If your organization uses a different identity provider, you can import users manually via CSV. See Manual Import for details.

Benefits

FeatureBenefit
User SyncAutomatic employee directory
SSOSingle sign-on to Bastion
GroupsSync groups for targeting
LifecycleAuto-offboarding when users leave

Azure Active Directory

Prerequisites

  • Azure AD tenant admin access
  • Application registration permissions

Setup Steps

  1. Create App Registration

    In Azure Portal, create a new application registration.

  2. Configure Permissions

    Grant required Microsoft Graph permissions.

  3. Generate Credentials

    Create client secret or certificate.

  4. Connect in Bastion

    Enter credentials in Bastion integration settings.

  5. Configure Sync

    Set up user and group sync options.

Required Permissions

PermissionTypePurpose
User.Read.AllApplicationRead user profiles
Group.Read.AllApplicationRead group memberships
Directory.Read.AllApplicationRead directory data

Configuration Options

SettingDescription
User ScopeAll users or specific groups
Group SyncWhich groups to sync
AttributesUser attributes to import
Sync FrequencyHow often to sync

Google Workspace

Prerequisites

  • Google Workspace super admin access
  • Domain-wide delegation enabled

Setup Steps

  1. Create Service Account

    In Google Cloud Console, create a service account.

  2. Enable Domain Delegation

    Grant domain-wide delegation to the service account.

  3. Add API Scopes

    Add required Admin SDK scopes.

  4. Connect in Bastion

    Upload service account credentials.

Required Scopes

ScopePurpose
admin.directory.user.readonlyRead user profiles
admin.directory.group.readonlyRead groups
admin.directory.orgunit.readonlyRead org units

Configuration Options

SettingDescription
Org UnitsWhich org units to sync
GroupsWhich groups to sync
Suspended UsersInclude or exclude

User Sync

Synced Attributes

AttributeDescription
EmailPrimary identifier
NameFirst and last name
DepartmentOrganizational unit
TitleJob title
ManagerReporting relationship
StatusActive/inactive

Sync Behavior

EventBastion Action
New UserCreate employee record
User UpdatedUpdate attributes
User DisabledMark for offboarding
User DeletedArchive employee

Handling Conflicts

When data conflicts:

  • Identity provider is source of truth
  • Manual edits preserved (configurable)
  • Conflicts logged for review

Group Sync

Synced Groups

Sync groups for:

  • Training assignment
  • Phishing campaign targeting
  • Access reviews
  • Policy application

Group Mapping

Map provider groups to Bastion:

Provider GroupBastion Group
EngineeringEngineering Team
SalesSales Team
All EmployeesEveryone

SSO Configuration

SAML SSO

Configure SAML for single sign-on:

  1. Download Bastion metadata
  2. Configure provider with metadata
  3. Upload provider metadata to Bastion
  4. Test SSO flow

OIDC SSO

Configure OIDC authentication:

  1. Register Bastion in provider
  2. Note client ID and secret
  3. Configure in Bastion settings
  4. Test authentication

Troubleshooting

Google Workspace sync stopped working — new employees are not appearing

This typically means the service account credentials have expired or domain-wide delegation was revoked. Check the integration status under Integrations > Installed — if it shows "Warning" or "Error," disconnect and reconnect the Google Workspace integration. Re-upload your service account credentials and verify domain-wide delegation is still enabled in the Google Admin console.

Users Not Syncing
  • Verify the user filter or org unit scope includes the expected users
  • Check that API permissions have not been revoked
  • Review sync logs under the integration detail view
  • Confirm network connectivity to the identity provider
  • For Google Workspace, ensure the service account has domain-wide delegation enabled
  • For Azure AD, verify the app registration client secret has not expired
SSO Failing
  • Verify SAML/OIDC configuration matches between provider and Bastion
  • Check that the signing certificate has not expired
  • Review attribute mapping (email must match)
  • Test in an incognito or private window to rule out cached sessions
  • Ensure the user exists in Bastion (SSO does not auto-create users)
Groups Missing
  • Verify group filter settings include the expected groups
  • Check that group read permissions are granted (Group.Read.All for Azure AD, admin.directory.group.readonly for Google)
  • Review group type compatibility — some group types (distribution lists) may not sync
Can I manage employees without an identity provider?

Yes. Import employees manually via CSV or add them individually through Employees > People. If a previous IdP integration is still configured, disconnect it first to avoid conflicts. Manual import means automatic sync, onboarding, and offboarding workflows will not be available.

Best Practices

Use Service Accounts

Use dedicated service accounts, not personal admin accounts.

Sync Incrementally

Start with a subset of users to verify before full sync.

Monitor Sync Health

Watch for sync failures and address quickly.

Test Offboarding

Verify offboarding works correctly before production.

Next Steps