Configuring SSO-Based Authentication on the Progress Chef 360 Platform

As DevOps environments scale, managing user access across multiple systems becomes increasingly complex. Maintaining separate credentials, ensuring consistent access controls and onboarding users efficiently can introduce both operational overhead and security risks. 

The Progress® Chef® 360™ platform addresses these challenges by integrating with external Identity Providers (IdPs) using Single Sign-On (SSO). It supports standard protocols such as OpenID Connect (OIDC) and SAML, allowing users to authenticate using their organization’s existing identity systems. This approach delegates authentication to the IdP, improving security while simplifying the login experience. 

This walkthrough provides a step-by-step guide to configuring SSO on the Chef 360 platform at the tenant level, along with an explanation of how authentication flows impact the end-user login experience. 

What is the Chef 360 Platform? 

Chef 360 is a platform designed to help organizations manage infrastructure automation, compliance and operational workflows in a unified manner. It enables teams to define and enforce policies, execute automation tasks, and monitor system state across their infrastructure. 

With Chef 360, organizations can automate infrastructure at scale, continuously validate compliance and orchestrate workflows through a centralized interface, improving consistency and operational efficiency across environments. 

Why Should You Enable SSO on the Chef 360 Platform? 

Enabling Single Sign-On (SSO) is not just a convenience; it plays an important role in strengthening security and simplifying access management. 

With SSO, users authenticate using their existing corporate credentials, eliminating the need to manage separate usernames and passwords for Chef 360. Authentication is delegated to a trusted Identity Provider (IdP), enabling alignment with enterprise authentication mechanisms and access control policies. 

This approach reduces risks associated with credential sprawl while improving the overall user experience. Chef 360 platform supports industry-standard protocols such as OpenID Connect (OIDC) and SAML 2.0, making it compatible with most enterprise identity providers. 

How to Enable SSO on the Chef 360 Platform? 

Prerequisites:

Before starting the configuration, ensure that you have: 

  • Administrative access to Chef 360 Tenant Management 

  • Access to an identity provider (Eg: Azure Active Directory) 

  • Required IdP configuration details:  

                 SAML: Metadata and X.509 certificates 

                 OIDC: Client ID, client secret and issuer URL 

Step 1: Access the SSO Configuration Page 

Log in to Chef 360 as a Tenant Administrator, then navigate to: 

Tenant Management → SSO Configuration  

This opens the SSO Settings page, which serves as the central location for configuring Single Sign-On at the tenant level. From here, you can view existing identity provider (IdP) configurations and add new providers using either OIDC or SAML.

 

Step 2: Configure Tenant-Level SSO Settings 

Before adding an identity provider, configure how Single Sign-On (SSO) should operate at the tenant level on Chef 360. 

These settings define access control and user onboarding behavior: 

  • Local Login (Fallback Authentication) - You can enable local login as a fallback method. This is recommended during initial setup to prevent accidental lockouts during SSO validation 

  • User Provisioning (Invite-Only) – Users are not automatically registered upon first SSO login. Access is strictly controlled through an invite-based model, where users must be explicitly added to the appropriate organizational unit. Only after being provisioned and assigned to the org unit will SSO authentication be enabled for that user. 

  • User Attributes and Mapping - You can configure attribute mappings to ensure identity information (such as email or username) is correctly passed from the Identity Provider (IdP).  

As a best practice, keep local login enabled until SSO configuration is fully tested and validated. 

Step 3: Add an Identity Provider 

To integrate an identity provider, select Add Provider and choose the appropriate protocol: 

  • SAML v2.0, or 

  • OpenID Connect (OIDC) 

SAML Configuration 

When configuring a SAML provider, provide the following details: 

  • Identity Provider (IdP) metadata or entity details 

  • Single Sign-On URL 

  • X.509 certificate issued by the IdP 

  • Attribute mappings to ensure user details (such as email) are correctly mapped 

These mappings enable Chef 360 to correctly interpret user identity information during authentication. 

OIDC Configuration 

For OpenID Connect, configuration includes: 

  • Client ID and client secret 

  • Issuer URL provided by the identity provider 

The Chef 360 platform allows you to import application configuration details using OpenID Connect (OIDC) metadata. Once configured, key parameters such as the Issuer, Authorization URL and Token URL are automatically populated.  

In addition to the OIDC metadata, you need to provide client-specific details such as the Client ID, client authentication method and Client Secret (if applicable). You have an option to define attributes for these settings. 

Configure Redirect URL in Identity Provider: After creating the Identity Provider configuration on the Chef 360 platform, a redirect URL is generated. This URL must be registered in your Identity Provider (IdP) configuration. This ensures that after successful authentication, the IdP can redirect users back to Chef 360 securely. 

 

Once the required details are entered, save the configuration to make the provider available for authentication. 

Importance of Attribute Mapping: Proper attribute mapping is critical for successful authentication. Attributes such as email or username are used by Chef 360 to uniquely identify users. If these attributes are missing or incorrectly mapped, users may not be able to log in or may not be associated with the correct account. 

Step 4: Set a Default Identity Provider 

After configuring one or more Identity Providers (IdPs), you can designate a default provider on the Chef 360 platform. This setting determines how users are directed during login. 

  • If a default provider is set, users are automatically redirected to that provider for authentication 

  • If multiple providers are configured without a default, users are presented with available login options and can choose their authentication method 

    This allows flexibility in environments where multiple identity providers are in use. 

Step 5: Test the Configuration 

After completing the setup, validate the configuration to ensure the authentication flow works as expected. 

  • Log out of Chef 360 

  • Navigate to the login page 

  • Click on Configured SSO and observe the login behavior  

                Automatic redirection (if a default provider is configured) or 

                Manual selection of an identity provider 

  • Authenticate using the configured Identity Provider.

Upon successful authentication, you are redirected back to the Chef 360 platform and granted access based on your configuration. 

Testing also helps confirm that user provisioning and attribute mappings are functioning correctly. 

 

User Login Experience 

Once Single Sign-On (SSO) is configured on the Chef 360 platform, the login experience varies based on your setup: 

  • If a default identity provider is configured, users are automatically redirected to that provider 

  • If multiple providers are configured without a default, users are presented with available login options 

  • If local login is enabled, users can also authenticate using email and password 

This flexibility allows organizations to support different authentication scenarios while maintaining a consistent user experience. 

Common Issues You May Face 

  • Incorrect configuration values 

              OIDC: Incorrect issuer or redirect URL  

              SAML: Incorrect SSO URL or metadata 

  • Invalid or expired certificates 

               Especially relevant for SAML configurations using X.509 certificates 

  • Improper attribute mapping 

              Missing or incorrect email mapping can prevent proper user identification and login 

  • Disabling local login too early 

              This can result in loss of administrative access if SSO is not fully validated 

Additionally, the Chef 360 platform requires a valid platform certificate to enable SSO. If this requirement is not met, the option to add an Identity Provider (IdP) may be disabled in the UI. 


Benefits of using SSO on the Chef 360 platform

Once Single Sign-On (SSO) is implemented on the Chef 360 platform, user onboarding becomes more efficient, as users authenticate using their existing organizational credentials. This reduces the need to manage separate credentials within the platform and lowers administrative overhead. 

By delegating authentication to a trusted Identity Provider (IdP), the Chef 360 platform aligns with enterprise authentication standards and improves overall security. It also enables consistent access control policies across systems, reducing risks associated with credential duplication and mismanagement. 

Conclusion 

Configuring SSO on the Chef 360 platform enables secure and streamlined access to the platform by integrating with enterprise Identity Providers using standard protocols such as OIDC and SAML. 

This approach simplifies user access management, enhances security through delegated authentication, and provides a consistent login experience across environments. As a result, organizations can better align Chef 360 with modern DevOps practices and enterprise identity management strategies. 

To see how SSO can be configured on the Chef 360 Platform, either contact your Account Manager or book a Demo with us.

 

 

 

Tags:

Vaamica Mahajan

Vaamica Mahajan is a Senior Product Manager at Progress Chef, where she leads UI and UX initiatives with an emphasis on user-centric design and product adoption. With over a decade of experience spanning both large enterprises and agile startups, Vaamica brings a strategic yet hands-on approach to building intuitive, impactful products. She is passionate about crafting seamless user experiences that drive engagement and long-term value. Outside of work, Vaamica is an avid runner and fitness enthusiast, always up for a challenge that pushes her limits.

Akshay Parvatikar

Akshay Parvatikar is a Manager of Technical Marketing at Progress. With a career of over twelve years and a bachelor's degree in Engineering, Akshay has worked in various roles such as solution engineering, customer consulting, and business development in web performance for Telecom and the e-commerce industry.

Related Blogs

  • Zero Trust Automation with Progress Chef 360
    Read more

  • Unify Automation, Reduce Tools Sprawl and Standardize Outcomes with Progress Chef 360
    Read more

  • The Progress Chef 360 Platform: Built for Enterprise-Ready Operations
    Read more