Admin
The Admin section lets you manager Cockpit users, AdminCentral groups, and Organisations.
It’s a good idea to manage access to your DX Cloud subscription. You an easily handle this using the Admin section in your Cockpit. Here, you can create and manage users, and create user groups for your subscription as well as perform administrative operations like password resets, or creating business units (Organisations).
Manage users
You can manage existing users directly from the Cockpit under the Access section. This includes:
Adding a user
You can add a new user to your DX Cloud subscription directly from the Cockpit under the Access section.
-
Go to Admin > Users.
-
Click Add.
-
If desired, click Active to immediately activate the user upon creation.
-
Input the user email.
-
Give the user a First Name.
-
Give the user a Last Name.
-
Add the user to the appropriate groups.
Groups listClick the group for details on what roles are included in each group.
- Cockpit groups
- Rancher groups
-
-
no access
-
Don’t forget to click Add.
-
User status
The user list allows you to quickly understand the status of the user.
-
Active Active users are represented by a green badge.
-
Inactive Inactive users are represented by a gold badge.
-
Not verified Unverified users are represented by a red badge.
Editing a user
-
Go to Admin > Users.
-
Scroll to the desired user.
-
Click Edit.
-
In the dialog window, edit the user as needed.
-
Don’t forget to click Edit.
Deleting users
-
Go to Admin > Users.
-
Scroll to the desired user.
-
Click Delete.
-
In the dialog window, click Delete to confirm that you definitely want to delete the user.
Reset user credentials
You can reset a user’s password or One-time Password (OTP) directly from the Cockpit under the Admin section.
- SSO users
-
If you’re using SSO for your DX Cloud subscription, you are unable to reset the password of those users logging in via Single Sign-On, as the password is managed via the OIDC provider.
-
Go to Admin > Users.
-
Scroll to the desired user.
-
Click Reset credentials. In the dialog, choose to:
-
Reset password Initiates password reset process
-
Reset OTP Initiates One-time Password (OTP) reset process
An email is sent to the user. Users should follow instructions to reset their password and/or OTP credentials.
-
Create user group
You can create a new user to your DX Cloud subscription directly from the Cockpit under the Admin section.
-
Go to Admin > AdminCentral groups.
-
Click Add.
-
Give the group a meaningful name.
-
Click the users that you want to add to the group.
If you accidentally click the wrong user, you can click them again and they’ll return to the Available group. -
Don’t forget to click Add.
-
Group access AdminCentral
If using the SSO module for authentication, you need to ensure the groups created in the Cockpit are granted access via the configuration in the SSO module.
-
Create a group in the Cockpit.
No special roles are needed for AdminCentral access. -
Assign users to the group. These are the users who you want to be able to access AdminCentral.
-
In the SSO module, ensure the group name created in the Cockpit is defined in the
config.yaml
file. See the SSO module configuration section for more details.path: /.magnolia/admincentral callbackUrl: http://localhost:8080/.auth postLogoutRedirectUri: http://localhost:8080/.magnolia/admincentral authorizationGenerators: - name: groupsAuthorization groups: targetProperty: groups mappings: - name: /COCKPIT_GROUP (1) targetGroups: (2) - editors targetRoles: (3) - editor
1 Where /COCKPIT_GROUP
is the name of the group you created in the Cockpit. If using Keycloak, the leading/
is mandatory.2 Defines the target group for the mapped group. 3 Defines any particular target roles for the group.
Add Organisation
You can create an Organisation so that you can group access to certain parts of your DX Cloud project based on a business unit or organisation. You can define access to clusters, domains, and namespaces this way and explicitly choose the users that are part of the unit.
-
Go to Admin > Organisations.
-
Click Add.
-
Give the organisation a meaningful name.
-
Give the organisation a meaningful description.
-
Choose the Cluster Ids for which you want to grant access.
-
Choose the Domains for which you want to grant access.
-
Choose the Namespaces for which you want to grant access.
-
Click the users that you want to add to the organisation.
If you accidentally click the wrong user, you can click them again and they’ll return to the Available group. -
Don’t forget to click Add.
-
Federations
Federations enable your organization to integrate external Identity Providers (IdPs) with our DX Cloud platform through OpenID Connect (OIDC) protocols or SAML. In the DX Cloud Cockpit, you can configure Federations to establish trusted relationships with third-party identity systems, configure Cockpit and Rancher mappings, as well as define user attribute mappings between your external IdP and platform resources.

In this section, you can find:
-
Instructions to add a Federation in the Cockpit
You can also find embedded help directly in the Cockpit.
Add a Federation
-
In the Cockpit, go to Admin > Federations.
-
Enter a Display name for your Federation. This autofills the Alias field.
-
Check the box for Enabled if you want to enable the Federation.
-
Select the type of the Federation. This is either OIDC or SAML.
The following are required:
-
Enter the Authorization URL.
-
Enter the Token URL.
-
Enter the Client ID.
-
Enter the Client secret.
The remainig are optional but recommended:
-
Enter the Logout URL.
-
Enter the User info URL.
-
Enter the Issuer.
-
Check the box for Validate signature if you want to validate the signature of the IDP token.
-
Check the box for Use JWKs URL if you want to use the JWKs URL to validate the signature of the IDP token.
-
Enter the JWKs URL.
The following are required:
-
Enter the SAML Metadata.
The remaining are optional but recommended:
-
Enter the Name ID Policy Format.
-
Enter the Principal Type. Use
NameID
.
-
-
Under Advanced settings, choose the Sync Mode. This is either Force on every login or Import only on first login.
-
Check the box for Trust Email if you want to trust the email of the user.
General settings
Alias
🏷️ Alias
The alias is used to identify the Federation in the system. This is the same as the Display name you enter when adding a Federation.
OpenID Connect settings
Authorization URL
🏷️ Authorization URL
The Authorization URL is the endpoint where the identity provider redirects the user after a successful authentication.
https://let.me.in.com
Token URL
🏷️ Token URL
The Token URL is the endpoint where the identity provider returns the access token.
https://get.my.token.com
Client ID
🏷️ Client ID
The Client ID is the unique identifier of the application in the identity provider.
You should get this from your Identity Provider.
jamesbond
Client secret
🏷️ Client secret
The Client secret is the secret key used to authenticate the application in the identity provider.
You should get this from your Identity Provider.
superFlyTopSecret5000
Logout URL
🏷️ Logout URL
The Logout URL is the endpoint where the identity provider redirects the user after a successful logout.
User info URL
🏷️ User info URL
The User info URL is the endpoint where the identity provider returns the user information.
Validate signature
🏷️ Validate signature
Click the checkbox to validate the signature of the IDP token.
Edit a Federation
When you add a Federation, you’re connecting DX Cloud to an external identity provider (IdP) to manage authentication for your users. This allows your organization to use Single Sign-On (SSO) through supported protocols like OpenID Connect (OIDC) or SAML.
After creating a Federation, you can add Cockpit, Rancher, Magnolia SSO, and User attribute mappings as required.
-
In the Cockpit, go to Admin > Federations.
-
Go to the stacked lines ☰ and click Edit.
-
Choose one of the following to edit:
Cockpit mappings
Cockpit mapping lets you automatically assign users to specific Cockpit groups based on identity information received from the Identity Provider (IdP) during login.
When a user logs in using a federated IdP (via SAML or OIDC), we inspect the user’s identity token for specific claims (such as email
, department
, or role
) and matches them to defined rules.
These mappings determine which Cockpit group the user should belong to.
Use Cockpit mappings to grant conditional access to environments, projects, or roles based on user attributes managed by your organization’s IdP.

To create a Cockpit mapping:
-
Go to the Cockpit mapping tab.
-
Go to Add new mapping.
-
Under Access for, select one of the following:
-
User matching claim: Only users whose IdP token contains a matching claim will be assigned to the group.
-
Everyone: All federated users will be assigned to the specified group, regardless of claims.
Use Everyone for general access groups, and User matching claim for more granular, attribute-based group assignments.
-
-
Enter a Name for the mapping.
This is used internally to help identify the mapping. Choose a meaningful name you will remember.
-
Enter a Claim.
The Claim is name of the claim to inspect in the IdP token.
Common examples include:
-
email
-
groups
-
department
-
roles
Get valid claim names from your IdP administrator or associated documentation.
-
-
Enter a Claim value.
The expected value of the claim to match.
Example:
If the token contains:
"department": "marketing"
Then the Claim would be
department
and the Claim value would bemarketing
. -
Select if it should be an exact match or a regex with Is regex.
Leave this unchecked to require an exact match. Enable it if you want to match patterns, for example:
-
^dev.*
matchesdevops
,developers
,dev-team
-
.*-team$
matchesfrontend-team
,backend-team
,qa-team
-
-
Select a Group
The Cockpit group to assign the user to if the claim match is successful.
Available groups depend on your Magnolia Cockpit configuration (e.g.,
Admin
,Editor
,Viewer
).
Rancher mappings
Rancher mappings let you automatically grant users access to specific Rancher environments based on identity information received from the Identity Provider (IdP) during login.
When a user logs in using a federated IdP (via SAML or OIDC), Magnolia inspects the user’s identity token for specific claims (such as email
, department
, or role
).
These mappings determine whether the user should be granted access to Rancher.
Use Rancher mappings to restrict or grant Kubernetes access based on organizational roles, departments, or other IdP-managed user attributes.

To create a Rancher mapping:
-
Go to the Rancher mapping tab.
-
Click Add new mapping.
-
Under Access for, select one of the following:
-
User matching claim: Only users whose IdP token contains a matching claim will be granted Rancher access.
-
Everyone: All federated users will be granted Rancher access, regardless of claims.
Use Everyone to grant broad Rancher access, and User matching claim to restrict access to specific teams or roles based on IdP attributes.
-
-
Enter a Name for the mapping.
This is used internally to help identify the mapping. Choose a clear, descriptive name such as
GrantDevTeamRancherAccess
. -
Enter a Claim.
The claim is the name of the attribute from the IdP token that Magnolia will inspect.
Common examples:
-
groups
-
department
-
team
-
roles
Check your IdP documentation or consult your administrator for the correct claim names.
-
-
Enter a Claim value.
The expected value of the claim that must be matched in order to grant access.
Example:
If the token includes:
"groups": ["devops", "qa"]
Then the Claim would be
groups
and the Claim value would bedevops
. -
Select whether the value should be treated as a regular expression by enabling Is regex.
Leave this unchecked to match the claim value exactly. Enable it if you want to match patterns, for example:
-
^dev.*
matchesdevops
,developers
,dev-team
-
.*-team$
matchesfrontend-team
,backend-team
,qa-team
-
Magnolia SSO mappings
Magnolia SSO mappings let you grant users access to specific Magnolia SSO clients and roles based on identity information received from the Identity Provider (IdP).
When a user logs in using a federated IdP (via SAML or OIDC), Magnolia inspects the user’s identity token for specific claims (e.g., email
, department
, groups
) and uses these mappings to determine which SSO client and role the user should be assigned to.
Use Magnolia SSO mappings to manage access across Magnolia services and applications through centralized SSO group and role assignments.

To create a Magnolia SSO mapping:
-
Go to the Magnolia SSO mapping tab.
-
Click Add new mapping.
-
Under Access for, select one of the following:
-
User matching claim: Only users whose IdP token contains a matching claim will be granted Magnolia SSO access.
-
Everyone: All federated users will be granted Magnolia SSO access, regardless of claims.
Use Everyone to grant broad Magnolia SSO access, and User matching claim to restrict access to specific teams or roles based on IdP attributes.
-
-
Enter a Name for the mapping.
This is used internally to identify the mapping. Choose something descriptive, such as
AssignMarketingToEditorRole
. -
Enter a Claim.
This is the name of the attribute in the IdP token that Magnolia will inspect to determine role assignment.
Common examples:
-
email
-
groups
-
roles
-
department
You can get valid claim names from your IdP administrator or documentation.
-
-
Enter a Claim value.
This is the expected value Magnolia should match against the specified claim.
Example:
If the token includes:
"groups": ["marketing", "design"]
Then the Claim is
groups
and the Claim value ismarketing
. -
Enable Is regex if the claim value should be interpreted as a regular expression.
Leave unchecked for exact matches. Use regex for flexible matching, e.g.:
-
^editor.*
matcheseditor
,editorial
,editorial-team
-
.*-group$
matchesqa-group
,admin-group
-
-
Select the Client.
This is the Magnolia SSO client the user should be assigned to if the mapping matches.
Clients represent applications or services integrated with Magnolia SSO.
-
Select the Role.
The role to assign to the user within the selected Magnolia SSO client.
Roles control what the user can do once logged into that client.
User attribute mappings
User attribute mappings let you populate user profile attributes in Magnolia based on values from the Identity Provider (IdP) token.
User attribute mappings are typically used to enrich Magnolia user profiles with data such as first name, last name, email, department, or any other identity-related field. This information can then be used for personalization, access control, or auditing within Magnolia.
Each mapping defines where the attribute value comes from, either from a claim in the IdP token or a hardcoded value, and maps it to a specific Magnolia user attribute.

To create a User attribute mapping:
-
Go to the User attribute mapping tab.
-
Click Add new mapping.
-
Choose the Attribute based on option:
-
Existing claim: The value will come from a claim in the IdP token.
-
Hardcoded value: The value is fixed and set manually.
-
Use Existing claim when pulling values like email , first_name , or department from your IdP.
Use Hardcoded value to assign a static value for all users (e.g., set "region": "EMEA" for everyone in a federation).
|
-
Enter a Name for the mapping.
This name helps you identify what the mapping is doing (e.g.,
SetEmailFromClaim
orSetRegionToEMEA
). -
If using Existing claim, enter the Claim name to extract the value from.
This should match the name of the claim in the IdP token.
Examples:
-
email
-
given_name
-
family_name
-
custom_department
You can get valid claim names from your IdP administrator or documentation.
-
-
Enter the User attribute.
This is the Magnolia user attribute you want to populate.
Examples:
-
email
-
firstName
-
lastName
-
department
-
region
Make sure the attribute name matches what’s supported or expected in your Magnolia user profile structure.
-
SSO clients
Our SSO module enables secure, authentication by integrating with your Identity Provider (IDP). This lets your users access a Magnolia instance using their existing credentials, streamlining workflows and enhancing security.

For DX Cloud deployments, configuring an SSO client is essential to connect your IDP to Magnolia.
If your IDP uses SAML instead of OIDC, we need to bridge the gap by routing authentication through Keycloak. Proper client configuration ensures smooth and secure access across your environments.
You must only create one SSO client per environment (e.g., production, integration).
Add configuration
To add an SSO client configuration:
-
Go to Admin > SSO clients.
-
Click Add.
-
Choose your desired Environment in the dropdown menu. You must only create one SSO client per environment (e.g., production, integration).
-
Click Enabled.
-
If desired, add redirect URLs.
-
Add the allowed CORS origins.
CORS restrictionsWeb origins must be listed in the SSO client configuration to allow cross-origin requests.
If your Magnolia instance is hosted at https://example-magnolia.com and you have a front-end app at https://frontend-app.com, you might configure the following web origins in the SSO client (e.g., in Keycloak):
-
https://example-magnolia.com
-
https://frontend-app.com
This ensures both domains can participate in the SSO authentication flow without being blocked by CORS restrictions.
-
-
Add the Base URL.
The default URL to use when the auth server needs to redirect or link back to the client.
-
Add any Magnolia roles you want mapped in the SSO module.
-
Click Add.
Magnolia SSO Config
Once you have configured your SSO client:
-
Go to your SSO client configuration in the SSO Client Config table.
-
Click the three bars .
-
Click Magnolia SSO Config to get your full Magnolia SSO module
.yaml
configuration. You can copy and paste the configuration directly into your SSO module. For detailed information on SSO module configuration, see Magnolia SSO module: Configuration.