Authentication
Authentication methods
Union.ai supports three authentication methods, each designed for a different use case.
| Method | Identity Type | Credentials | Use Case |
|---|---|---|---|
| OIDC | Human user | Browser SSO | UI access, initial CLI login |
| API Keys | Human user (delegated) | Static bearer token | CI/CD scripts, simple automation |
| Service Accounts | Application identity | OAuth2 client_id + client_secret -> short-lived token | Production pipelines, multi-service systems |
API keys are issued per user and inherit the user’s RBAC permissions. They can be created and revoked via the UI or CLI.
Service accounts are provisioned by the platform, creating OAuth2 applications with distinct, auditable identities independent of any human user.
Single sign-on
Union.ai uses OAuth2 / OIDC for SSO. Customers can configure any OIDC or SAML 2.0 compliant identity provider (Google Workspace, Microsoft Entra ID, Okta, etc.). SSO provides centralized identity management where the user lifecycle is managed in the customer’s IdP. MFA enforcement is delegated to the customer’s IdP, so the customer’s existing MFA policies apply without additional configuration. Session management is inherited from the IdP configuration, and all authentication events are logged with caller identity.
Verification
SSO and credential lifecycle
Reviewer focus: Confirm that SSO redirects to the customer’s IdP, that MFA is enforced when configured, and that API keys and service accounts can be created, used, and revoked.
How to verify:
-
SSO: Log in. The browser redirects to the customer’s IdP, and an MFA prompt appears if configured.
-
API key: Create a key, use it in a script, then revoke it:
uctl create api-key # Use the key in a script to authenticate uctl delete api-key <key-id> # Confirm the revoked key is rejected -
Service account: Create a service account and confirm it has a distinct identity:
uctl create service-accountShow the OAuth2 token exchange and confirm the service account appears as a distinct identity in the audit log.
This verification is fully self-service.