Overview
Xloud Identity supports multiple authentication drivers that can be combined within the same deployment. Each domain can use a different backend, allowing you to integrate enterprise LDAP directories or federated identity providers alongside local SQL accounts.Backend Comparison
| Backend | Use Case | Configuration |
|---|---|---|
| SQL | Default. Local users stored in MariaDB. Zero external dependencies. | Built-in; no additional config required. |
| LDAP | Enterprise directory integration. Users and groups sourced from Active Directory or OpenLDAP. | Configured per-domain via XDeploy globals. |
| SAML 2.0 | SSO with corporate IdPs (Okta, Azure AD, ADFS). | Requires mod_shib and federation mapping rules. |
| OIDC | Modern SSO via OAuth 2.0 / OpenID Connect providers. | Requires mod_auth_openidc and attribute mapping. |
SQL Backend (Default)
The SQL backend is active by default and requires no additional configuration. All user accounts created through the Dashboard or CLI are stored in MariaDB.Verify the SQL backend is active
LDAP Integration
LDAP integration sources users and groups from an external directory. Xloud Identity connects in read-only mode — user creation and password changes must happen in the directory, not in Xloud.Configure LDAP in XDeploy globals
Set the following in your deployment globals via XDeploy:
LDAP configuration in deployment globals
SAML 2.0 Federation
SAML 2.0 federation enables SSO with corporate identity providers. Users authenticate at the IdP and receive Xloud tokens without a local password.Configure the identity provider in your IdP
Register Xloud as a service provider in your IdP. Provide the Xloud SAML metadata URL:
Create attribute mapping
Define how IdP attributes map to Xloud groups and projects:Example mapping rules:
Create mapping rules
mapping-rules.json
OpenID Connect
OIDC federation uses OAuth 2.0 bearer tokens from a compatible provider (Google, Azure AD, Okta, Keycloak).Create OIDC identity provider
Create OIDC mapping
Create OIDC federation protocol
Next Steps
Domain Management
Assign different authentication backends to different domains.
Federation
Advanced federation configuration — mapping rules and attribute assertions.
Security Hardening
Secure your authentication backends with encryption and access controls.
Admin Troubleshooting
Debug LDAP connectivity and federation authentication issues.