Single Sign On support is offered through our Tidepool+ Essential and Tidepool+ Professional tiers. To learn more about Tidepool+, please use this link to schedule a meeting with our Sales team.

Tidepool supports enterprises or organizations that may wish to manage credentials and security settings (e.g. password complexity, expiration, ip address restrictions) within their own infrastructure to fulfill compliance needs and local requirements, leverage existing identity stores and policies within the organization.

After Tidepool applies an SSO configuration for an email domain, recognized log-in attempts will redirect the user to sign in with their Clinic credentials, so long as the user was added to the appropriate AD group(s), they will authenticate appropriately and successfully access Tidepool.

Note: There is a user invite process within the Tidepool application that assigns either Clinic Member or Clinic Admin permissions, managed by someone with Clinic Admin permissions in the application

Tidepool has implemented Keycloak, an Open Source identity broker supported by Red Hat and deployed and managed by Tidepool in Tidepool’s AWS cloud to integrate enterprise login services.

Using Keycloak allows Tidepool to support multiple identity providers agnostically for the individual organizations allowing them to maintain complete control over users and support them in maintaining a single source of truth for login.

Keycloak functions as a Service Provider which allows Tidepool to integrate with enterprise Single Sign On services running SAML or OpenID to federate authentication and authorization.

After integrating with Keycloak, when a clinician or other organizational user logs into Tidepool with an internet domain that has been federated, instead of authenticating with a username and password to the Tidepool User Store, Tidepool will redirect logins for that domain to the organization's user store (called an IdP, or Identity Provider) using the SAML or OpenID Connect protocols supported by nearly all Identity Providers as Open Standards, though there are differences in functionality, behavior and configuration among each IdP.

Once an identity has been verified with the IdP it provides a token to Tidepool’s Keycloak instance (the SP or Service Provider) that authenticates and authorizes the user to use Tidepool according to their role.

Authentication flows

SAML Federated authentication flow

OpenID Connect authentication flow

Tidepool Keycloak setup flow

  1. Organization contacts clinic@tidepool.org to initiate discussion

    1. Schedule a call with organization IT/Security staff for initial discussion and requirements discovery

  2. Tidepool meets with Organization IT staff to discuss details of configuration:

    1. IdP integration

    2. domains and patterns required to authenticate users

    3. process for org integration

    4. timeline and support communications

  3. Organization and Tidepool Agree on timeline and ensure changes and notifications are coordinated with clinic and IT staff

  4. Tidepool configures Keycloak ↔︎ IdP integration via an exchange of secure tokens and information on how to authenticate organization users. This usually consists of metadata information in a structured file or a URL pointing to an .xml file and exchanging needed service URLs and endpoint information

Differences

Requirements

Example Identify Providers supporting SAML and/or OpenID

More Information on Keycloak, SAML and OpenID Connect

https://auth0.com/intro-to-iam/saml-vs-openid-connect-oidchttps://en.wikipedia.org/wiki/Security_Assertion_Markup_Languagehttps://openid.net/connect/faq/https://www.keycloak.org