Auth Providers
Each tenant in RAMP can have its own set of authentication providers. Users authenticate through the provider configured for their tenant, enabling different organizations to use their existing identity infrastructure.
Supported Provider Types
Section titled “Supported Provider Types”| Provider | Description | Use Case |
|---|---|---|
| RAMP Internal | Username and password stored in the RAMP database | Small teams, testing, standalone deployments |
| LDAP | LDAP or Active Directory authentication | Enterprise environments with existing AD infrastructure |
| OIDC (OpenID Connect) | Azure AD, Keycloak, Okta, Auth0, Authentik | Cloud-first organizations, SSO requirements |
| Windows Auth | Windows Integrated Authentication (IIS/Kerberos) | Intranet deployments in Windows environments |
Adding an Auth Provider
Section titled “Adding an Auth Provider”- Navigate to Tenants, then select the tenant you want to configure.
- Open the Auth Providers tab.
- Click Add Provider.
- Select the provider type.
- Configure the provider-specific settings (see sections below).
- Click Test Connection to verify the configuration.
- Click Save.
Configuring RAMP Internal
Section titled “Configuring RAMP Internal”RAMP Internal authentication stores usernames and passwords directly in the RAMP database. No additional configuration is required beyond enabling the provider.
This provider is useful for:
- Local administrator accounts
- Service accounts
- Development and testing environments
- Deployments without external identity infrastructure
Configuring LDAP
Section titled “Configuring LDAP”LDAP authentication connects RAMP to an existing LDAP directory or Active Directory.
Required settings:
| Setting | Description | Example |
|---|---|---|
| Server | LDAP server hostname or IP | ldap.example.com |
| Port | LDAP port number | 389 (LDAP) or 636 (LDAPS) |
| Base DN | Base distinguished name for user searches | dc=example,dc=com |
| User Filter | LDAP filter to locate user accounts | (sAMAccountName={0}) |
| Bind DN | Distinguished name for the bind account | cn=svc-ramp,ou=services,dc=example,dc=com |
| Bind Password | Password for the bind account | (secret) |
| Use SSL | Enable SSL/TLS for the connection | true for port 636 |
Configuring OIDC (OpenID Connect)
Section titled “Configuring OIDC (OpenID Connect)”OIDC authentication integrates RAMP with modern identity providers that support the OpenID Connect protocol.
Required settings:
| Setting | Description | Example |
|---|---|---|
| Authority URL | The OIDC issuer URL | https://keycloak.example.com/realms/myrealm |
| Client ID | The OAuth2 client identifier | ramp-client |
| Client Secret | The OAuth2 client secret | (secret) |
| Scopes | Requested OAuth2 scopes | openid profile email |
- Create a new client in Keycloak with Client authentication enabled.
- Set the Valid redirect URIs to your RAMP URL followed by
/_auth/callback. - Copy the Client ID and Client Secret to RAMP.
- The Authority URL follows the pattern:
https://keycloak.example.com/realms/{realm}
- Register an application in the Azure portal under App registrations.
- Create a client secret under Certificates & secrets.
- Configure the redirect URI to your RAMP URL followed by
/_auth/callback. - The Authority URL follows the pattern:
https://login.microsoftonline.com/{tenant-id}/v2.0
- Create an OIDC application in the Okta admin console.
- Set the sign-in redirect URI to your RAMP URL followed by
/_auth/callback. - Copy the Client ID and Client Secret.
- The Authority URL follows the pattern:
https://{domain}.okta.com
- Create a new OAuth2/OpenID Provider in Authentik.
- Set the redirect URI to your RAMP URL followed by
/_auth/callback. - Copy the Client ID and Client Secret.
- The Authority URL follows the pattern:
https://authentik.example.com/application/o/{app-slug}/
OIDC Directory Browsing
Section titled “OIDC Directory Browsing”By default, RAMP only sees external IDP users after they have logged in at least once (CachedOnly mode). When directory browsing is enabled, RAMP can search users and groups directly from the identity provider.
Enabling Directory Browsing
Section titled “Enabling Directory Browsing”For OIDC providers that expose Admin APIs (Keycloak, Entra ID, Okta, Authentik), you can enable full directory browsing:
-
Open the OIDC connection settings for the tenant.
-
Enter the Admin API Endpoint for your provider:
Provider Admin API Endpoint Keycloak https://keycloak.example.com/admin/realms/{realm}Entra ID https://graph.microsoft.com/v1.0Okta https://{domain}.okta.com/api/v1Authentik https://authentik.example.com/api/v3 -
Ensure the OAuth2 client has the necessary API permissions for your provider.
-
Save the configuration.
After saving, the connection mode changes from CachedOnly to FullBrowse, and you can search for users and groups directly from the provider.
CachedOnly vs. FullBrowse
Section titled “CachedOnly vs. FullBrowse”| Feature | CachedOnly | FullBrowse |
|---|---|---|
| See users who have logged in | Yes | Yes |
| Search all provider users | No | Yes |
| Browse provider groups | No | Yes |
| Sync groups from provider | No | Yes |
| Requires Admin API endpoint | No | Yes |
| Requires additional API permissions | No | Yes |
Configuring Windows Auth
Section titled “Configuring Windows Auth”Windows Integrated Authentication uses Kerberos or NTLM for seamless authentication in Windows environments.
Required settings:
| Setting | Description | Example |
|---|---|---|
| Domain | Windows domain name | EXAMPLE |
Testing a Provider
Section titled “Testing a Provider”After configuring a provider, always test the connection before relying on it:
- Click Test Connection on the provider configuration page.
- For LDAP: RAMP will attempt to bind to the directory with the configured credentials.
- For OIDC: RAMP will validate the authority URL and fetch the OpenID Connect discovery document.
- Review the test results for any errors.
Managing Existing Providers
Section titled “Managing Existing Providers”Editing a Provider
Section titled “Editing a Provider”Navigate to the tenant’s Auth Providers tab, click on the provider, modify the settings, and save. Test the connection after making changes.
Removing a Provider
Section titled “Removing a Provider”Removing an authentication provider prevents users from logging in through that provider. Users who have previously authenticated through the removed provider will retain their RAMP accounts but will need to use an alternative provider.
Next Steps
Section titled “Next Steps”After configuring authentication providers, configure the auth settings to control the default login behavior for the tenant.