# Account

The Account Settings page allows you to manage your Reblaze user accounts.&#x20;

## **Tab: Your account details**

![Your account details](https://content.gitbook.com/content/CWgVjpGHfzXGmM9HfqF3/blobs/L4wQaEs4xDmaps5ZnDKT/RBZDEVEVGENIYL%20_%20Account%202021-06-08%2012-51-43.png)

### Basic account settings

From this tab, you can reset your password, name, and phone number.&#x20;

### Settings for OTPs (One Time Passwords)

Reblaze uses 2FA (two factor authentication). There are several options for sending an OTP when you login:

* If only an email address is provided, the OTP will be sent via email.
* If a phone number is provided, the OTP will be sent over SMS message.
* As an alternative, you can also get a QR code for use in apps such as Google Authenticator (available for both [Android](https://play.google.com/store/apps/details?id=com.google.android.apps.authenticator2) and [iPhone](https://itunes.apple.com/il/app/google-authenticator/id388497605)).&#x20;

### API Key

This tab also offers a personal API key, to be used in all requests to the Reblaze API.

## Tab: Users management

![Users management](https://content.gitbook.com/content/CWgVjpGHfzXGmM9HfqF3/blobs/xUZZMIlVNxMicJaNKNxR/RBZDEVEVGENIYL%20_%20Account%202021-06-08%2013-38-45.png)

This tab allows you to manage users that are attached to your organization. It is only available to users with administrator permissions.

### Administration

An admin can:

* Create a new user
* Edit an existing user
* Reset a user's password
* Delete a user

When a user account is being edited, this will appear:&#x20;

![Edit User](https://content.gitbook.com/content/CWgVjpGHfzXGmM9HfqF3/blobs/dBPK3yZA4c00MwdHQYSj/RBZDEVEVGENIYL%20_%20Account%202021-06-08%2013-42-12.png)

The available Access Levels are:

* *Viewer*: can see the [Traffic](https://waap.docs.link11.com/v2.20.4/console-ui-walkthrough/reblaze-traffic) section, i.e. the Dashboard and View Log.
* *Editor*: has all Viewer permissions, and can also configure security rulesets and policies in the [Security](https://waap.docs.link11.com/v2.20.4/console-ui-walkthrough/security) and [Settings](https://waap.docs.link11.com/v2.20.4/console-ui-walkthrough/settings) sections.
* *Organization Admin*: has all Editor permissions, and can also manage users via the Users Management page.
* *Reblaze Admin*: has all Organization Admin permissions, and can also edit and view the Notes, Init and Run pages.

## **Tab: Single sign on configuration**

![](https://content.gitbook.com/content/CWgVjpGHfzXGmM9HfqF3/blobs/OfgUCAAKLa4HahDjRuDw/RBZDEVEVGENIYL%20_%20Account%202021-06-08%2014-31-44.png)

This tab allows SSO to be configured so that users have the ability to log into Reblaze with their **Okta** or **Microsoft** accounts.

Configuration options will vary depending on the type of account.

### Set up Okta SSO

#### **1. Go to** [**Okta**](https://www.okta.com/)**, register and create an application:**

Go to `https://{YOUR ACCOUNT}-admin.okta.com/admin/apps/active`

Click `Add Application` → `Create New App`

Choose `Platform: Web`, `Sign on method: SAML 2.0`

![](https://content.gitbook.com/content/CWgVjpGHfzXGmM9HfqF3/blobs/lBaj0Uimaf3I3jt3jr0T/Setup-Okta-SSO-1.png)

#### **2. Name it, setup links and attributes:**

*Single sign on URL*:&#x20;

`RBZ_SSO_ASSERTION_URL` env var. Value should look like: `https://{CUSTOMER_DOMAIN}/sso/saml20/signon`.<br>

*Audience URI (SP Entity ID)*:&#x20;

`RBZ_SSO_AUDIENCE_URL` env var. Value should look like: `https://{CUSTOMER_DOMAIN}/sso/saml20/audience`<br>

![](https://content.gitbook.com/content/CWgVjpGHfzXGmM9HfqF3/blobs/ZDbwUlnhrrFdOgh7YGg9/Setup-Okta-SSO-2.png)

*Attribute Statements:*<br>

emailaddress: `user.email`<br>

displayname: `user.firstName + " " + user.lastName`<br>

groups: `appuser.rbzgroups`

![](https://content.gitbook.com/content/CWgVjpGHfzXGmM9HfqF3/blobs/7WJnzf1Ym1Pc3HEyFOmb/Setup-Okta-SSO-3.png)

#### **3. Custom User profile**

In order to pass Admin group ID we need to add custom attribute to the user groups.\
Directory > Profile Editor > Apps > Click on Profile<br>

![](https://content.gitbook.com/content/CWgVjpGHfzXGmM9HfqF3/blobs/NAHCUlBeaAm9zzADwDaJ/Setup-Okta-SSO-4.png)

![](https://content.gitbook.com/content/CWgVjpGHfzXGmM9HfqF3/blobs/enNZ6SgL2R2CuGNjUTV0/Setup-Okta-SSO-5.png)

Next step will be to map it.&#x20;

Directory > Profile Editor > Apps > Click on Mappings

![](https://content.gitbook.com/content/CWgVjpGHfzXGmM9HfqF3/blobs/toy0Pvlk0zyc8XlLBAcB/Setup-Okta-SSO-6.png)

**4. Assign the application to users**

Create user groups for two possible access levels: Admin and Read-Only access.&#x20;

Assign users to it. Group name is the string you need for `RBZSSOSAML2_ADMINGROUP` or place the group name into the Reblaze console SSO settings.

![](https://content.gitbook.com/content/CWgVjpGHfzXGmM9HfqF3/blobs/BfeRH8HHjfiIctAocuX1/Setup-Okta-SSO-7.png)

And in your just-created Application settings:

![](https://content.gitbook.com/content/CWgVjpGHfzXGmM9HfqF3/blobs/jxK3szEdStqhful7dsDt/Setup-Okta-SSO-8.png)

On the assignment step, a value will be required for the custom attribute which we configured before. For the admin group the value will be same as on `RBZSSOSAML2_ADMINGROUP`, while for the read-only group value it can be anything else.

#### **5. Get Metadata XML link:**

Add the **URL** to the XML metadata file to the `RBZ_SSO_META_URL` env var (and/or for Provider URL field in admin)\
The URL example: <https://vreagles.okta.com/app/exkl1t3p61ek810CP5d6/sso/saml/metadata><br>

![](https://content.gitbook.com/content/CWgVjpGHfzXGmM9HfqF3/blobs/LTT1OlkdTKrnYibfnRXF/Setup-Okta-SSO-9.png)

\ <br>

#### **6. Where to get** `RBZ_SSO_IDP_ISSUER`**:**

Go to Applications, choose yours, `Sign On` tab, click on `View Setup Instructions`

![](https://content.gitbook.com/content/CWgVjpGHfzXGmM9HfqF3/blobs/WJWJopccC9jdi4mxPz7A/Setup-Okta-SSO-10.png)

There you'll find Identity Provider Issuer:

![](https://content.gitbook.com/content/CWgVjpGHfzXGmM9HfqF3/blobs/jBRE0KMay82QcFBawyoH/Setup-Okta-SSO-11.png)

### Set up Microsoft Azure SSO

**1. Go to** [**Azure Portal**](https://azure.microsoft.com/en-us/account/) **→** `Enterprise applications`

**2. Choose** `+ New Application` **→** `+ Create your own application`**:**

![](https://content.gitbook.com/content/CWgVjpGHfzXGmM9HfqF3/blobs/ceeFgPI6wdFblNI8J8IH/Setup-Microsoft-Azure-SSO-1.png)

**3. Choose option** `Integrate any other application you don't find in the gallery (Non-gallery)` **(this option will create SSO app):**

![](https://content.gitbook.com/content/CWgVjpGHfzXGmM9HfqF3/blobs/qvgjAkFGydedkX5lOZ7Z/Setup-Microsoft-Azure-SSO-2.png)

**4. Go to** `Single sign-on` **section and choose** `SAML`**:**

![](https://content.gitbook.com/content/CWgVjpGHfzXGmM9HfqF3/blobs/nbUiI3FzAeVjh2uWgdxy/Setup-Microsoft-Azure-SSO-3.png)

**5. Set up appropriate links:**

![](https://content.gitbook.com/content/CWgVjpGHfzXGmM9HfqF3/blobs/xUS3kkywgwOFG4x9ryQm/Setup-Microsoft-Azure-SSO-4.png)

`RBZ_SSO_IDP_ISSUER` should be provided by a customer and have to be unique for the customer’s SSO applications. The best option is to just use something like: `https://customer_domain.com?sso=123`. (the **IDP** **Issuer** field (in the console) should be identical to the **Identifier** field (in Azure))\
\
**6. Get Metadata XML link and add to** `RBZ_SSO_META_URL` **environment variable:**

![](https://content.gitbook.com/content/CWgVjpGHfzXGmM9HfqF3/blobs/SsIgnkgWTHcZ1u6b9Zpq/Setup-Microsoft-Azure-SSO-5.png)

&#x20;**7. Setup** `user.groups` **in User Attributes & Claims, so it send all groups related to the user:**

\
Click on “+ **Add a group claim”,** choose:

* **All groups**
* Source attribute: **Group ID**

![](https://content.gitbook.com/content/CWgVjpGHfzXGmM9HfqF3/blobs/FzDrewjXlDCCWtZ67Rg4/Setup-Microsoft-Azure-SSO-6.png)

![](https://content.gitbook.com/content/CWgVjpGHfzXGmM9HfqF3/blobs/z0q5gIZmvbHHncSZN1OM/Setup-Microsoft-Azure-SSO-7.png)

**8. Add a user as a member of the application:**

![](https://content.gitbook.com/content/CWgVjpGHfzXGmM9HfqF3/blobs/hbYuSKrberc2e3bp3URA/Setup-Microsoft-Azure-SSO-8.png)

**9. Get admin group ID from Azure and put it into** `RBZ_SSO_ADMIN_GROUP` **environment variable:**\
Go to `Azure Active Directory` → `Groups`, create a group.

`Object ID` is the string you need for `RBZ_SSO_ADMIN_GROUP` or place the group ID into the Reblaze console SSO settings:

![](https://content.gitbook.com/content/CWgVjpGHfzXGmM9HfqF3/blobs/kSwPOhz1ZCk5cCnwu5vv/Setup-Microsoft-Azure-SSO-9.png)

And assign a user to the group:

![](https://content.gitbook.com/content/CWgVjpGHfzXGmM9HfqF3/blobs/XUuzrsKLd3FcEG4B6yaU/Setup-Microsoft-Azure-SSO-10.png)

<br>
