For setting up automatic controls over how your New Relic users are added to New Relic, how they're managed, and how they log in, we offer these features:
- SAML SSO: this allows your users to use a single sign-on (SSO) identity provider service to log in to New Relic, as opposed to using the default email + password.
- Requirements: Pro or Enterprise edition.
- SCIM provisioning, also referred to as automated user management (AUM): SCIM provisioning allows organizations to use their identity provider service to automate how their users are added to and updated in New Relic. By definition, SCIM provisioning requires use of SAML SSO, but SAML SSO doesn't require SCIM.
- Requirements: Enterprise edition, and organization must be on the New Relic One user model (more on that below).
Before enabling these, it's important to understand another major factor that affects these features: which user model your organization is on. In 2020, we released a new and improved user model, called the New Relic One user model. At first mainly new customers made use of this model, but now it’s available to some of our older customers via a user migration procedure. Over time, all users will be migrated to this model.
For information on how to enable SAML and SCIM, choose your user model below. If you’re not sure which you’re on, see Overview of user model.
If you need more help, check out these support and learning resources:
- Browse the Explorers Hub to get help from the community and join in discussions.
- Find answers on our sites and learn how to use our support portal.
- Run New Relic Diagnostics, our troubleshooting tool for Linux, Windows, and macOS.
- Review New Relic's data security and licenses documentation.