Authentication methods
Users can access Aiven using multiple authentication methods:Password
Email and password
- Traditional username/password
- Optional two-factor authentication (2FA)
- Can be disabled organization-wide
Third-Party
Social login providers
- Microsoft
- GitHub
- Can be disabled organization-wide
SAML SSO
Identity providers
- Okta, Auth0, Azure AD, Google Workspace
- FusionAuth, JumpCloud, OneLogin
- Custom SAML 2.0 providers
- Organization-managed
Tokens
API access
- Personal tokens for organization users
- Application tokens for automation
- Linked to authentication method
- Can be restricted by IP address
Authentication policies
Authentication policies control how all users in your organization can access Aiven resources. Policies are set at the organization level by organization admins.Configuring authentication policy
Password authentication
- With 2FA Required
- Without 2FA
- Disabled
Strongest password securityWhen enabled:
- Users must set up 2FA to access organization resources
- Works with authenticator apps (Google Authenticator, Authy, 1Password)
- Does not affect SSO or identity provider logins
- Personal tokens continue to work
Users must enable 2FA through the Aiven Console in their user profile settings.
Third-party authentication
Allow or block social login providers:Third-party authentication is convenient but doesn’t provide the same level of control as enterprise identity providers. For production organizations, consider using SAML SSO instead.
SSO with identity providers
Control whether users can access your organization through SSO:- Any organization's IdP
- Only your organization's IdP
Default setting
- Users who belong to multiple Aiven organizations can log in using any of those organizations’ identity providers
- More flexible for users
- Less secure for organizations
Personal tokens
Control whether organization users can create personal tokens:- Enabled - Users can generate tokens for API/CLI access
- Disabled for managed users - Only non-managed users can create tokens (they still can’t use them to access your organization)
- Disabled for all - No personal tokens allowed; use application users instead
Application users and their tokens are not affected by this setting. Application tokens always work regardless of authentication policy.
Token authentication method enforcement
Ensure tokens conform to your authentication policy:- Enabled - Tokens can only be used if they were created with an allowed authentication method
- Disabled - Tokens work regardless of how they were created
IP address restrictions
Limit access to trusted networks:- Aiven Console access
- API calls
- CLI commands
- Personal tokens
- Application tokens
SAML identity providers
Connect your organization to enterprise identity providers for single sign-on:Supported identity providers
Okta
Popular enterprise IdP with detailed setup guide
Azure AD
Microsoft’s identity platform with setup guide
Google Workspace
Google’s enterprise IdP with setup guide
Auth0
Flexible identity platform with setup guide
OneLogin
Cloud-based IdP with setup guide
JumpCloud
Directory platform with setup guide
FusionAuth
Customer identity platform with setup guide
Custom SAML
Any SAML 2.0 compatible identity provider
Setting up an identity provider
Start IdP configuration in Aiven
Admin → Identity providers → Add identity provider
- Choose IdP type
- Enter name
- Note the Metadata URL and ACS URL provided by Aiven
Configure SAML application in your IdP
In your identity provider (Okta, Azure AD, etc.):
- Create new SAML application
- Set ACS URL (Assertion Consumer Service URL)
- Set Entity ID / Audience
- Configure attribute mapping (email, first name, last name)
- Assign users to the application
Complete setup in Aiven
Return to Aiven Console:
- Enter IdP URL from your identity provider
- Enter Entity ID from your identity provider
- Upload IdP certificate or enter certificate content
- Save configuration
Link users (if needed)
Users with email addresses on verified domains are automatically linked.For other users:
- Signup URL - New users create Aiven account linked to IdP
- Account link URL - Existing users link their Aiven account to IdP
IdP configuration example (Okta)
Domain verification for SSO
Verify your email domain to automatically link users:
Benefits of verified domains:
- Users automatically linked to IdP when logging in
- No need to send signup/link URLs
- Users become managed users
- Better visibility and control
IdP security best practices
Enable IdP-initiated login only if needed
Logging in from IdP dashboard is less secure than from Aiven Console
Require authentication policy with IdP only
Force all users to use SSO by disabling other authentication methods
Use short session durations
Configure your IdP with session timeouts appropriate for your security needs
Authentication tokens
Tokens provide programmatic access to the Aiven API, CLI, and Terraform Provider:Token types
- Session tokens
- Personal tokens
- Application tokens
Automatic temporary tokens
- Created when you log in to Console or CLI
- Automatically revoked on logout
- Short-lived (hours)
- Cannot be manually created
Creating personal tokens
Generate token
Click Generate tokenConfigure:
- Description (e.g., “Laptop CLI access”)
- Max age (session duration)
- Allowed IP ranges (optional but recommended)
Token security best practices
Use application users for automation
Never use personal tokens for CI/CD, Terraform, or monitoring - use application users
Set appropriate expiration
- Personal tokens: 30-90 days
- Application tokens: 90 days, rotate regularly
Token authentication with authentication policies
Tokens are linked to the authentication method used when they were created:Application tokens are never affected by authentication policies. They always work regardless of policy settings.
Troubleshooting
Cannot log in after authentication policy change
Cannot log in after authentication policy change
Cause: New policy doesn’t allow your authentication methodSolution:
- Contact organization admin to temporarily enable your auth method
- Log in using allowed method (e.g., IdP if password is disabled)
- Link new authentication method to your account
SAML authentication failed
SAML authentication failed
Cause: Misconfiguration in IdP or AivenSolution:
- Use SAML Tracer browser extension
- Verify ACS URL and Entity ID match between IdP and Aiven
- Check certificate is not expired
- Verify users are assigned to SAML app in IdP
- Check attribute mapping (email, firstName, lastName)
Invalid relay state error
Invalid relay state error
Cause: Attempting to log in from IdP dashboard (IdP-initiated login)Solution:
- Log in from Aiven Console instead (SP-initiated login)
- Or enable IdP-initiated login in Aiven Console
- Or set default relay state/start URL in IdP to Aiven Console URL
Token stopped working
Token stopped working
Cause: Authentication policy changed with token enforcement enabledSolution:
- Log in with allowed authentication method
- Create new token (will be linked to allowed method)
- Update applications with new token
IdP password doesn't work
IdP password doesn't work
Cause: User account not linked to IdPSolution:
- Get Account Link URL from IdP settings in Aiven Console
- Follow link and log in with existing Aiven password
- Authenticate with IdP to complete linking
- Check linked authentication methods in profile
Locked out of organization
Locked out of organization
Cause: IP restriction or auth policy changeSolution:
- Contact another organization admin to adjust policy
- If no other admins, contact Aiven support
- Use VPN to access from allowed IP range
API reference
Next steps
Users & Permissions
Manage users and grant appropriate access
Security
Learn about Aiven’s security architecture
Organizations
Set up your organization structure
Monitoring & Logs
Monitor authentication events and audit logs