SSO & Access Control
Juno provides enterprise-grade authentication and authorization through integration with your identity provider, ensuring secure access while maintaining full control over user permissions.
Single Sign-On (SSO)
Overview
Juno supports major SSO protocols including SAML 2.0, OpenID Connect (OIDC), and Active Directory, ensuring seamless authentication aligned with your security standards.
Benefits
| Benefit | Description |
|---|---|
| Seamless Integration | Users sign in with their existing corporate credentials |
| Enhanced Security | Centralized authentication reduces password-related security risks |
| Simplified Management | IT administrators manage access through your existing identity provider |
| Audit Trail | Complete logging of authentication events for compliance |
Setting Up SSO
During implementation, your IT team will work with our team to:
- Configure Connection: Set up the SSO connection between Juno and your identity provider
- Test Integration: Validate the connection with test users before go-live
- Map Attributes: Configure user attribute mapping for seamless profile creation
- Domain Verification: Verify your organization’s domains for automatic SSO routing
Your Juno implementation team will provide detailed setup instructions and direct support for your IT team during SSO configuration.
Role-Based Access Control (RBAC)
Overview
Juno uses a combination of role-based and relationship-based access control to ensure users only access data and features appropriate to their role.
Built-in Access Levels
Juno provides three primary access levels out of the box:
Organization Admin
- Access Method: SSO or code-based authentication
- Scope: Full organizational administration
- Use Case: Primary administrators responsible for configuring policies, managing users, and overseeing operations
Coordinator
- Access Method: SSO or code-based authentication
- Scope: Coordinator-level operations
- Use Case: Coordinators responsible for inviting and managing travelers
Guest/Traveler
- Access Method: Code-based authentication
- Scope: Travel booking and expense submission
- Use Case: Non-employee travelers submitting expenses and managing bookings
Custom Roles
Beyond the built-in levels, Juno supports fully customizable role creation with fine-grained permissions:
| Permission | Description |
|---|---|
| Reporting | Access reporting and analytics |
| Travel Management | Invite and coordinate travelers |
| Trip Oversight | View all organizational trips |
| User Management | Add/remove users |
| Configuration | Modify organizational settings |
| Financial | Manage payment accounts |
| Universal Approval | Override approval workflows |
| User Administration | Comprehensive user management |
Creating Custom Roles
Custom roles are configured by a Juno account manager. Contact your account manager to request one.
Security Features
Session Management
- Secure Cookies: Session tokens stored in secure, HTTP-only cookies
- Session Refresh: Automatic token refresh for a seamless experience
- Organization Context: Sessions tied to specific organizational contexts
- Timeout Policies: Configurable session timeout based on organizational policies
Audit and Compliance
- Authentication Logging: Complete audit trail of all authentication events
- Permission Changes: Tracked and logged permission modifications
- Access Attempts: Failed authentication attempts logged for security monitoring
- Integration Events: SSO connection events monitored and recorded
Changes to user permissions may take up to 5 minutes to propagate throughout the system due to caching optimizations.
Best Practices
Role Design
- Principle of Least Privilege: Grant only the minimum permissions required for each role
- Regular Review: Periodically audit user permissions and remove unnecessary access
- Separation of Duties: Avoid combining conflicting permissions in single roles
- Clear Naming: Use descriptive role names that clearly indicate their purpose
User Management
- Automated Provisioning: Leverage SSO attribute mapping for automatic user provisioning
- Offboarding Process: Ensure prompt access removal when users leave the organization
- Regular Audits: Conduct periodic access reviews to identify and remove stale accounts
- Training: Ensure users understand their permissions and appropriate usage
Troubleshooting
Common SSO Issues
- Connection Failures: Verify domain configuration and certificate validity
- Attribute Mapping: Check user attribute mapping between identity provider and Juno
- Permissions Not Loading: Clear browser cache and verify role assignments
For additional support with SSO configuration or access control issues, contact your Juno account manager or implementation specialist.