Skip to main content

Identity Provider Integration

Overview

Identity provider integrations sync your employee directory and enable single sign-on (SSO). This is typically the first integration to set up.

Supported Providers

info

If your organization uses a different identity provider, you can import users manually via CSV. See Manual Import for details.

Benefits

FeatureBenefit
User SyncAutomatic employee directory
SSOSingle sign-on to Bastion
GroupsSync groups for targeting
LifecycleAuto-offboarding when users leave

Azure Active Directory

Prerequisites

  • Azure AD tenant admin access
  • Application registration permissions

Setup Steps

  1. Create App Registration

    In Azure Portal, create a new application registration.

  2. Configure Permissions

    Grant required Microsoft Graph permissions.

  3. Generate Credentials

    Create client secret or certificate.

  4. Connect in Bastion

    Enter credentials in Bastion integration settings.

  5. Configure Sync

    Set up user and group sync options.

Required Permissions

PermissionTypePurpose
User.Read.AllApplicationRead user profiles
Group.Read.AllApplicationRead group memberships
Directory.Read.AllApplicationRead directory data

Configuration Options

SettingDescription
User ScopeAll users or specific groups
Group SyncWhich groups to sync
AttributesUser attributes to import
Sync FrequencyHow often to sync

Google Workspace

Prerequisites

  • Google Workspace super admin access
  • Domain-wide delegation enabled

Setup Steps

  1. Create Service Account

    In Google Cloud Console, create a service account.

  2. Enable Domain Delegation

    Grant domain-wide delegation to the service account.

  3. Add API Scopes

    Add required Admin SDK scopes.

  4. Connect in Bastion

    Upload service account credentials.

Required Scopes

ScopePurpose
admin.directory.user.readonlyRead user profiles
admin.directory.group.readonlyRead groups
admin.directory.orgunit.readonlyRead org units

Configuration Options

SettingDescription
Org UnitsWhich org units to sync
GroupsWhich groups to sync
Suspended UsersInclude or exclude

User Sync

Synced Attributes

AttributeDescription
EmailPrimary identifier
NameFirst and last name
DepartmentOrganizational unit
TitleJob title
ManagerReporting relationship
StatusActive/inactive

Sync Behavior

EventBastion Action
New UserCreate employee record
User UpdatedUpdate attributes
User DisabledMark for offboarding
User DeletedArchive employee

Handling Conflicts

When data conflicts:

  • Identity provider is source of truth
  • Manual edits preserved (configurable)
  • Conflicts logged for review

Group Sync

Synced Groups

Sync groups for:

  • Training assignment
  • Phishing campaign targeting
  • Access reviews
  • Policy application

Group Mapping

Map provider groups to Bastion:

Provider GroupBastion Group
EngineeringEngineering Team
SalesSales Team
All EmployeesEveryone

SSO Configuration

SAML SSO

Configure SAML for single sign-on:

  1. Download Bastion metadata
  2. Configure provider with metadata
  3. Upload provider metadata to Bastion
  4. Test SSO flow

OIDC SSO

Configure OIDC authentication:

  1. Register Bastion in provider
  2. Note client ID and secret
  3. Configure in Bastion settings
  4. Test authentication

Troubleshooting

Users Not Syncing
  • Verify filter includes users
  • Check API permissions
  • Review sync logs
  • Confirm network connectivity
SSO Failing
  • Verify SAML/OIDC configuration
  • Check certificate validity
  • Review attribute mapping
  • Test in incognito mode
Groups Missing
  • Verify group filter settings
  • Check group read permissions
  • Review group type compatibility

Best Practices

Use Service Accounts

Use dedicated service accounts, not personal admin accounts.

Sync Incrementally

Start with a subset of users to verify before full sync.

Monitor Sync Health

Watch for sync failures and address quickly.

Test Offboarding

Verify offboarding works correctly before production.

Next Steps