Skip to content

Authentication Overview

RAMP supports multiple authentication methods to meet the needs of different deployment scenarios. This guide helps you choose the right authentication method for your organization.

MethodBest ForComplexityFeatures
RAMP NativeSmall teams, getting startedLowUsername/password, MFA, password reset
OIDC/OAuth2Modern SSO, cloud environmentsMediumSSO, external IdP, OAuth2
Windows AuthCorporate intranets, AD environmentsMedium-HighSeamless Windows login, AD integration
LDAPEnterprise directories, OpenLDAPMediumDirectory integration, centralized users
ADFSLegacy enterprise SSOMedium-HighWS-Federation, claims-based auth

  • You’re getting started with RAMP
  • You have a small team (< 50 users)
  • You don’t have an existing identity provider
  • You want to manage users directly in RAMP
  • You need Multi-Factor Authentication (MFA)
  • You use Microsoft Entra ID (Azure AD), Google Workspace, Okta, or Auth0
  • You want modern Single Sign-On (SSO)
  • You need to integrate with cloud-based identity providers
  • Your users already authenticate with OAuth2/OIDC
  • You want to leverage external identity provider features
  • RAMP will run on your internal network (intranet)
  • All users are on Windows domain machines
  • You want seamless authentication (no login prompts)
  • You have Active Directory
  • RAMP will be hosted on Windows Server with IIS
  • You have Active Directory or OpenLDAP
  • You want centralized user management
  • You need to authenticate against enterprise directories
  • You want to search/browse directory users
  • RAMP can be hosted on Linux or Windows
  • You already use Active Directory Federation Services
  • You need claims-based authentication
  • You have legacy WS-Federation integrations
  • You want SSO across multiple on-premise applications
  • Your organization uses Windows Server with ADFS

RAMP can support multiple authentication providers simultaneously. For example:

  • Internal admins use RAMP native accounts with MFA
  • Employees use Windows Authentication or LDAP
  • External contractors use OIDC with Google Workspace

Each user has an IdentityProvider field that determines how they authenticate.


  • Available for RAMP native users
  • TOTP-based (Google Authenticator, Authy, Microsoft Authenticator)
  • 10 backup codes per user
  • Admin-configurable policies (None/Optional/Required)

See MFA Setup Guide

  • All authentication methods integrate with RAMP’s permission system
  • Users get roles regardless of authentication source
  • Permissions are enforced uniformly
  • All login attempts are logged
  • Failed authentication tracked
  • User activity audited

  1. Use HTTPS in production — Never deploy RAMP with HTTP-only
  2. Rotate secrets regularly — JWT secrets, client secrets, service account passwords
  3. Enable MFA — For administrative accounts at minimum
  4. Monitor failed logins — Watch for brute-force attempts
  5. Use strong passwords — Especially for bootstrap administrators
  6. Limit scope — Grant minimum required permissions
  • Deploy RAMP on internal networks when using Windows Authentication
  • Use VPNs for external access
  • Configure firewalls to restrict API access
  • Use reverse proxies (nginx, IIS) with proper TLS configuration
  • Development: Use ASP.NET Core User Secrets
  • Production: Use Azure Key Vault, AWS Secrets Manager, or HashiCorp Vault
  • Never commit secrets to source control

See Email Setup Guide for SMTP password security


FeatureRAMP NativeOIDCWindows AuthLDAPADFS
Setup Time15 min30-60 min2-4 hours1-2 hours2-4 hours
External DependenciesNoneIdP accountAD + IISLDAP serverADFS server
SSONoYesYesNoYes
Directory SearchNoOptionalYesYesLimited
MFA SupportYes (built-in)Via IdPNoNoVia IdP
Password ResetYes (email)Via IdPVia ADVia LDAPVia IdP
Auto-ProvisioningManualYesYesYesYes

  1. Review your requirements using the decision guide above
  2. Choose an authentication method
  3. Follow the setup guide for your chosen method
  4. Configure additional features:
  5. Test authentication before deploying to production
  6. Review security settings and enable audit logging

Can I use multiple authentication methods?

Section titled “Can I use multiple authentication methods?”

Yes! RAMP supports multiple providers simultaneously. Each user has an IdentityProvider field indicating their authentication source.

Yes, but it requires careful planning. Users must be recreated with the new identity provider. Contact support for migration assistance.

All methods can be secure when properly configured. For maximum security:

  • Enable MFA for RAMP native users
  • Use SSO with an enterprise IdP (OIDC, ADFS)
  • Keep all systems patched and updated

Yes, RAMP stores user metadata (roles, preferences, assignments) in its database regardless of authentication method. The database doesn’t store passwords for external IdP users.

Yes, use OIDC with a public IdP (Google, Microsoft, Auth0) and configure appropriate role assignments for external users.