Single Sign-On (SSO)
The Hugging Face Hub gives you the ability to implement mandatory Single Sign-On (SSO) for your organization.
We support both SAML 2.0 and OpenID Connect (OIDC) protocols.
How does it work?
When Single Sign-On is enabled, the members of your organization must authenticate through your Identity Provider (IdP) to access any content under the organization’s namespace. Public content will still be available to users who are not members of the organization.
We use email addresses to identify SSO users. Make sure that your organizational email address (e.g. your company email) has been added to your user account.
When users log in, they will be prompted to complete the Single Sign-On authentication flow with a banner similar to the following:
Single Sign-On only applies to your organization. Members may belong to other organizations on Hugging Face.
We support role mapping: you can automatically assign roles to organization members based on attributes provided by your Identity Provider.
Supported Identity Providers
You can easily integrate Hugging Face Hub with a variety of Identity Providers, such as Okta, OneLogin or Azure Active Directory (Azure AD). Hugging Face Hub can work with any OIDC-compliant or SAML Identity Provider.
How to configure OIDC/SAML provider in the Hub
We have some guides available to help with configuring based on your chosen SSO provider, or to take inspiration from:
- How to configure OIDC with Okta in the Hub
- How to configure OIDC with Azure in the Hub
- How to configure SAML with Okta in the Hub
- How to configure SAML with Azure in the Hub
Users Management
Session Timeout
This value sets the duration of the session for members of your organization.
After this time, members will be prompted to re-authenticate with your Identity Provider to access the organization’s resources.
The default value is 7 days.
Role Mapping
When enabled, Role Mapping allows you to dynamically assign roles to organization members based on data provided by your Identity Provider.
This section allows you to define a mapping from your IdP’s user profile data from your IdP to the assigned role in Hugging Face.
IdP Role Attribute Mapping
A JSON path to an attribute in your user’s IdP profile data.
Role Mapping
A mapping from the IdP attribute value to the assigned role in the Hugging Face organization.
You must map at least one admin role.
If there is no match, a user will be assigned the default role for your organization. The default role can be customized in the Members
section of the organization’s settings.
Role synchronization is performed on login.
External Collaborators
This enables certain users within your organization to access resources without completing the Single Sign-On (SSO) flow described before. This can be helpful when you work with external parties who aren’t part of your organization’s Identity Provider (IdP) but require access to specific resources.
To add a user as an “External Collaborator” visit the SSO/Users Management
section in your organization’s settings. Once added, these users won’t need to go through the SSO process.
However, they will still be subject to your organization’s access controls (Resource Groups). It’s crucial to manage their access carefully to maintain your organization’s data security.
< > Update on GitHub