Skip to main content

Tenant configuration

This settings area includes all configurations the operator can apply at the Tenant level. Typically, they affect all new Users and Projects within the Tenant.

General configuration

Sign in with

Configure a fast sign-up lane using a third-party account provider. We currently support the following:

  • Google
  • Microsoft
  • OpenID Provider (OP) or Identity Provider (IDP)

Sign in with Google

Follow the instructions provided by Google at the following link. It will redirect you to the Google APIs console and guide you in creating a dedicated project. Once you have a valid OAuth client ID, configure the console gateway URL in the Authorised JavaScript origins. For any issue about the Project creation, contact Google account support.

info

The redirect URI must be https://console.<tenant-name>.cubbit.eu/oauth/redirect or in case of a custom domain https://<custom-domain>/oauth/redirect. It's very important to add it to the "Authorised redirect URIs".

Sign in with Google

Sign in with Microsoft

Enabling the sign-in with Microsoft requires specifying two IDs, creating a secret and configuring custom parameters. Create your application following the Microsoft documentation. If you already have a Microsoft application, you can see it in the Microsoft Entra admin centre.

These IDs will be displayed in the app overview:

  • Application (client) ID
  • Directory (tenant) ID
warning

These IDs will enable only users of this particular Microsoft tenant. If you want to enable all users with a Microsoft account: Directory (tenant) ID must be 9188040d-6c67-4c5b-b112-36a304b66dad.

For more information please check here

Copy and paste the Application ID into the Composer interface.

Sign in with Microsoft

info

Learn how to support multiple directories in the same application here

To create the client secret, go to the Certificates & secrets section and click on New client secret. Insert a description, select the expiration date, and save it. Copy the secret value and paste it into the Composer interface.

The DS3 console associated with the Tenant is now connected to the Microsoft application we have created. To complete the configuration to work with Cubbit, we must first configure the authentication, the token, and the API permissions.

Authentication

Under Platform Configuration, you are asked to configure the DS3 Console. To do this, add a new platform of type "Web application > Web" In the form that appears, paste the following DS3 Console address https://console.<tenant-name>.cubbit.eu and https://console.<tenant-name>.cubbit.eu/oauth/redirect under the redirect uris section and select ID tokens (used for implicit and hybrid flows).

info

In case of a custom domain add https://<custom-domain> and https://<custom-domain>/oauth/redirect.

Token configuration

On the application sidebar, select Token configuration and add the following optional claim:

  • Email
  • Family_name
  • Given_name

If the menu item is not present, you have to manually configure the token in the Manifest menu. Insert the following item in the root of the JSON

  "optionalClaims": {
"idToken": [
{
"name": "email",
"source": null,
"essential": false,
"additionalProperties": []
},
{
"name": "family_name",
"source": null,
"essential": false,
"additionalProperties": []
},
{
"name": "given_name",
"source": null,
"essential": false,
"additionalProperties": []
}
],
"accessToken": [],
"saml2Token": []
},
API permission

The information included in the token requires authorisation, which can be done through the API permission section. Here, the following permissions (all from the Microsoft Graph group) must be added:

  • Email
  • Profile
  • User.Read

Sign in with OpenID Provider (OP) or Identity Provider (IDP)

OpenID Connect is a simple identity layer on top of the OAuth 2.0 protocol. It allows clients to verify the identity of the end-user based on the authentication performed by an authorisation server, as well as to obtain basic profile information about the end-user in an interoperable and REST-like manner. The configuration strongly depends on the OpenID Provider (OP) or Identity Provider (IDP) you are using. The following fields are mandatory:

  • Name: the name of the OP or IDP
  • Client ID: the client ID provided by the OP or IDP
  • Issuer: the URL of the OP or IDP
  • Client Secret: the client secret provided by the OP or IDP

Once you have filled in the mandatory fields, you have to configure the following on the OP or IDP side:

  • Redirect URI: the URI where the OP or IDP will redirect the user after the authentication process
  • Scope: the scope of the access request
info

The following scopes are mandatory:

  • openid
  • profile - should contain given_name and family_name
  • email
warning

The redirect URI must be https://console.<tenant-name>.cubbit.eu/oauth/redirect or in case of a custom domain https://<custom-domain>/oauth/redirect. It's very important to add it to the allowed origins in the OP or IDP configuration.

Sign in with openId

Default number of Projects per user

Every User can create multiple Projects and be invited to collaborate with others. The number of Projects a User may create can be limited, as defined by the Tenant configuration.

warning

Changing this value affects only newly created Users. The change must be done from the Users section on the specific resource to modify the value for existing Users.

Disable console sign-up

Console sign-up, and more broadly, User sign-up, can be restricted for the current Tenant. This limitation can be implemented at different levels:

  1. Turning off sign-up for all users.
  2. Allowing sign-up only for specific domains.

The first option blocks all sign-ups from both the console and API user-side but still permits the creation of new Users from the DS3 Composer. Check how to invite a new User in Manage Projects and Users.

The second option lets you specify a list of valid domains the Tenant will accept. They will be validated during the sign-up operation. All emails that do not match the requirements will be rejected. Type an allowed domain into the input field and press enter to specify it. Invalid domains will prompt an error notification, while accepted domains will be added below automatically.

Free tier

Every Project can have a reserved capacity included in its plan, which exempts it from billing. This reserved capacity value can be specified for any resource tracked in the usage report. If no resources need to be reserved for the Project, simply disable the free-tier configuration. The unit of measurement remains fixed for all resources.

info

Setting 0 is equivalent to letting the Project pay for everything it uses.

warning

Changing this value affects only newly created Users. The change must be done from the Projects section on the specific resource to modify the value for existing users.

Notifications

Enabling the free tier and configuring at least one resource with a positive value will make the section visible. Within this section, there are tabs for each resource. Only the tab corresponding to the enabled resource will be active. Here, you can set up alert notifications to be sent to specified email addresses and, if selected, to the Project owner.

info

The email frequency is specified for each level. To view this information, simply hover over the adjacent info icon.

Notification setup

The threshold for each resource is customisable and optional. You can leave any threshold blank if you're not interested in receiving notifications for that particular resource. Remember that the threshold should always respect the Alert > Warning > Info order.

The email received by the Project owner differs from other emails. The Project owner's email will contain a link to the DS3 Console, while other emails will include a link to the DS3 Composer, as they are expected to be related to Tenant operators.

warning

Changing this value affects only newly created Projects. The change must be done from the Projects section on the specific resource to modify the value for existing Projects.

Whitelabel

The white-label feature allows the Tenant to tailor the DS3 console’s visual aesthetics and the email sent to the end-users. Use it to customise the product with your company logos and communications.

Custom DNS

Coming soon

Custom content

A master switch protects white-label custom contents. This ensures you can configure the icons and content and enable them only once they are set up properly.

Contents are grouped into three areas:

  • Icons
  • Sign-up text
  • Sign-in text

Icons

Three different icon formats are required, ensuring they are not duplicates of previously configured icons. The favicon is designated as the tab icon. The remaining two logos are intended for use within console UI and emails, with the selection of either version dependent on the space available.

Sign-up/Sign-in text

The text on the sign-in (console.<tenant-name>.cubbit.eu/signin) and sign-up (console.<tenant-name>.cubbit.eu/signup) screens will be updated to the standard text used by the application.

info

Style your text with basic HTML tags:

  • Insert a line break with <br/>.
  • For bold text, use <strong> or <b>.
  • For italic text, use <i>.
  • Wrap paragraphs in <p> tags.
warning

Even if the console supports multiple languages, the text will always be displayed in a single language. This means all users will see the text you enter in the same language.

Connect storage

The storage section is where you manage the space allocated to the Tenant. To ensure operational functionality for users, a Tenant must always maintain a connection to a storage system. For more storage information, check What is a Swarm?

Before starting, ensure your operator is active and you have correctly created a Tenant.

From the Tenant Overview, open Settings and select the storage tab.

Tenant storage

Under the introduction, a dropdown menu lets you choose between your vendor's storage options or private Swarms's. For any inquiry, please contact your vendor.

note

Once storage is connected, it cannot be changed.

After connecting storage, the notification bar in the Tenant Overview will no longer be visible.

Gateways

Gateways are access points to the Swarms connected to your Tenant. In Cubbit, it is possible to have multiple gateways connected in remote locations. The section allows you to create, configure, and manage your gateways. For more information, check What is a DS3 Gateway?

(Coming soon)

Operators

Operators list all the collaborators of the Tenant. Here, you can see, manage, and invite your colleagues and get support in Tenant management. We currently have three different levels of privilege:

  • Owner and Admin are allowed to perform every operation in the Tenant context
  • Member can view and manage Tenant resources
  • Read only can view Tenant resources
note

The main difference between Admin or Owner and Member is the management of the Tenant operators, which is limited to Admins and Owners.

For more information, check What is an operator?