To manage their users, New Relic organizations can configure "authentication domains," which control how users are added to your New Relic account and how they’re authenticated.
To check if you have access to these features, you can go to the authentication domain settings UI and see if you can configure settings.
Requirements to configure these settings:
- Pro tier is required for all options except automated user management, which requires Enterprise tier.
- These features allow managing users on the New Relic One user model. To learn more, see User models.
- You must be in a user group that has the Authentication domain manager role.
- SAML support:
What is an authentication domain?
An "authentication domain" is a grouping of New Relic users governed by specific settings regarding how users are provisioned (added) and how they are authenticated (logged in).
When someone creates a New Relic account, the default authentication settings are:
- Users are manually added to New Relic
- Users manually log in using their username and password
Those default settings would be under one "authentication domain." Another authentication domain might be set up like this:
- Users are added and managed automatically from an identity provider (like Okta or Azure AD)
- Users are logged in using SAML single sign-on (SSO) from an identity provider
When you add users to New Relic, they’re added within a specific authentication domain. Users in one authentication domain are not available for management when in another domain. Typically organizations will have either one or two authentication domains: one for the manual, default methods and one for the methods tied to their identity provider.
Configurable elements of an authentication domain include:
- Source of users (managed manually via the UI or managed automatically via identity provider)
- Authentication method (using manual username/password login or using SSO).
- Session management (how long a user can stay logged in, how long a browser session can be idle)
Configure authentication domain via UI
For more about the configuration options, keep reading.
Source of users
From the authentication domain UI, you can set one of two options for how users are added to New Relic:
- Manual: this means that your users are added manually to New Relic.
- SCIM: enabling SCIM lets you use our automated user management (AUM) to import/manage users from your identity provider. Please read requirements and impacts before enabling.
To set up automated user management, see our AUM docs.
The authentication method is used by all users in an authentication domain. Once a user authenticates with New Relic, they can access any New Relic account they've been granted permissions for.
There are two authentication options:
- Username/password: your users log in via standard username and password.
- SAML SSO: your users log in via SAML single sign-on (SSO) via your identity provider.
How users authenticate to New Relic is independent of how they're added (manually or SCIM). SCIM-added users require SAML SSO but manually-added users may or may not use SAML SSO.
Configure SAML SSO
For the SAML services we support, see Requirements.
To set up SAML SSO from the authentication domain UI:
- Under Authentication, click Configure.
- Under Method of authenticating users, select SAML SSO.
- Under Provided by New Relic, review your New Relic SAML service provider details.
- Under Provided by you, set the source of SAML metadata with a URL pointing to your SAML metadata (recommended). This URL is supplied by your identity provider and should conform to SAML V2.0 metadata standards.
Alternatively, set the source of SAML metadata by selecting Upload a certificate and selecting Choose file. This should be a PEM encoded x509 certificate. A certificate should only be uploaded if your identity provider does not support dynamic configuration.
- Under Provided by you, set the SSO target URL supplied by your identity provider.
- If your organization's SAML integration provides a redirect URL for logout, enter the Logout redirect URL; otherwise, leave it blank.
From the authentication domain UI, you can configure some session-related settings, including:
- How long users remain logged in for
- The maximum amount of time the browser can remain idle before logout