Skip to content

Auth Providers

Each tenant in RAMP can have its own set of authentication providers. Users authenticate through the provider configured for their tenant, enabling different organizations to use their existing identity infrastructure.

ProviderDescriptionUse Case
RAMP InternalUsername and password stored in the RAMP databaseSmall teams, testing, standalone deployments
LDAPLDAP or Active Directory authenticationEnterprise environments with existing AD infrastructure
OIDC (OpenID Connect)Azure AD, Keycloak, Okta, Auth0, AuthentikCloud-first organizations, SSO requirements
Windows AuthWindows Integrated Authentication (IIS/Kerberos)Intranet deployments in Windows environments
  1. Navigate to Tenants, then select the tenant you want to configure.
  2. Open the Auth Providers tab.
  3. Click Add Provider.
  4. Select the provider type.
  5. Configure the provider-specific settings (see sections below).
  6. Click Test Connection to verify the configuration.
  7. Click Save.

RAMP Internal authentication stores usernames and passwords directly in the RAMP database. No additional configuration is required beyond enabling the provider.

This provider is useful for:

  • Local administrator accounts
  • Service accounts
  • Development and testing environments
  • Deployments without external identity infrastructure

LDAP authentication connects RAMP to an existing LDAP directory or Active Directory.

Required settings:

SettingDescriptionExample
ServerLDAP server hostname or IPldap.example.com
PortLDAP port number389 (LDAP) or 636 (LDAPS)
Base DNBase distinguished name for user searchesdc=example,dc=com
User FilterLDAP filter to locate user accounts(sAMAccountName={0})
Bind DNDistinguished name for the bind accountcn=svc-ramp,ou=services,dc=example,dc=com
Bind PasswordPassword for the bind account(secret)
Use SSLEnable SSL/TLS for the connectiontrue for port 636

OIDC authentication integrates RAMP with modern identity providers that support the OpenID Connect protocol.

Required settings:

SettingDescriptionExample
Authority URLThe OIDC issuer URLhttps://keycloak.example.com/realms/myrealm
Client IDThe OAuth2 client identifierramp-client
Client SecretThe OAuth2 client secret(secret)
ScopesRequested OAuth2 scopesopenid profile email
  1. Create a new client in Keycloak with Client authentication enabled.
  2. Set the Valid redirect URIs to your RAMP URL followed by /_auth/callback.
  3. Copy the Client ID and Client Secret to RAMP.
  4. The Authority URL follows the pattern: https://keycloak.example.com/realms/{realm}

By default, RAMP only sees external IDP users after they have logged in at least once (CachedOnly mode). When directory browsing is enabled, RAMP can search users and groups directly from the identity provider.

For OIDC providers that expose Admin APIs (Keycloak, Entra ID, Okta, Authentik), you can enable full directory browsing:

  1. Open the OIDC connection settings for the tenant.

  2. Enter the Admin API Endpoint for your provider:

    ProviderAdmin API Endpoint
    Keycloakhttps://keycloak.example.com/admin/realms/{realm}
    Entra IDhttps://graph.microsoft.com/v1.0
    Oktahttps://{domain}.okta.com/api/v1
    Authentikhttps://authentik.example.com/api/v3
  3. Ensure the OAuth2 client has the necessary API permissions for your provider.

  4. Save the configuration.

After saving, the connection mode changes from CachedOnly to FullBrowse, and you can search for users and groups directly from the provider.

FeatureCachedOnlyFullBrowse
See users who have logged inYesYes
Search all provider usersNoYes
Browse provider groupsNoYes
Sync groups from providerNoYes
Requires Admin API endpointNoYes
Requires additional API permissionsNoYes

Windows Integrated Authentication uses Kerberos or NTLM for seamless authentication in Windows environments.

Required settings:

SettingDescriptionExample
DomainWindows domain nameEXAMPLE

After configuring a provider, always test the connection before relying on it:

  1. Click Test Connection on the provider configuration page.
  2. For LDAP: RAMP will attempt to bind to the directory with the configured credentials.
  3. For OIDC: RAMP will validate the authority URL and fetch the OpenID Connect discovery document.
  4. Review the test results for any errors.

Navigate to the tenant’s Auth Providers tab, click on the provider, modify the settings, and save. Test the connection after making changes.

Removing an authentication provider prevents users from logging in through that provider. Users who have previously authenticated through the removed provider will retain their RAMP accounts but will need to use an alternative provider.

After configuring authentication providers, configure the auth settings to control the default login behavior for the tenant.