Single Sign-on (SSO) is a feature of Cloudron where users can use the same credentials (username & password) for logging in to apps.
SSO integration is optional and can be selected at the time of app installation. Turning off SSO can be beneficial when the app is meant to be used primarily by external users (for example, a community chat or a public forum).
Note that some apps do not support Cloudron SSO. Such apps manage their user credentials on their own and users have to be managed inside the app itself.
When SSO is available for an app, the user management options will look like below:
Leave user management to the app is selected, the app's Cloudron SSO integration will be disabled
and all user management has to be carried from within the app. This is useful when the app primarily caters
to external users (like say a community chat).
When SSO integration is unavailable for an app, the user management options look like below:
New users can be added to the Cloudron with their email address from the
New User to add a new user:
They will receive an invite to sign up. Once signed up, they can access the apps they have been given access to.
To remove a user, simply remove them from the list. Note that the removed user cannot access any app anymore.
Groups provide a convenient way to group users. You can assign one or more groups to apps to restrict who can access for an app.
You can create a group by using the
Groups menu item.
New Group to add a new group:
To set the access restriction use the app's configure dialog.
A Cloudron administrator is a special right given to an existing Cloudron user allowing them to manage
apps and users. To make another existing user an administator, click the edit (pencil) button corresponding to
the user and check the
Make this user a Cloudron admin checkbox.
The password reset mechanism relies on email delivery working reliably. Users can reset their own passwords.
In the event that email delivery is not working, an administrator can generate a new password reset link for another user by clicking on the 'Send invitation email' button.
This will open up a dialog showing the password reset link. If email delivery is not working for some reason, the link can be sent to the user by some other means.
The password reset mechanism relies on email delivery working reliably. Admins can reset their own passwords
by navigating to
In the event that email delivery is not working, the reset token can be determined by SSHing into the server:
mysql -uroot -ppassword -e "select username, email, resetToken from box.users";
Use the reset token displayed above to navigate to
If a user loses their 2FA device, the Cloudron administrator can disable the user's 2FA setup by SSHing into the server and running the following command:
# replace fred below with the actual username root@my:~# mysql -uroot -ppassword -e "UPDATE box.users SET twoFactorAuthenticationEnabled=false WHERE username='fred'" mysql: [Warning] Using a password on the command line interface can be insecure.
Once disabled, user can login with just their password. After login, they can re-setup 2FA.
Impersonate a user
One can create a file named
/tmp/cloudron_ghost.json which contains an username
and a fake password like:
With such a file in place, you can login to the Webadmin UI using the above credentials (the user has to already exist). This helps you debug and also look into how the UI might look from that user's point of view.
This file is intentionally located in
/tmp for the off chance
that the system admin forgets about it (so it will get cleaned up on next reboot atleast).
The following characters are allowed in usernames:
- Alphanumeric characters
- '.' (dot)
- '-' (hyphen)
Usernames must be chosen with care to accomodate the wide variety of apps that run on Cloudron.
For example, very generic words like
404 might be reserved by apps.