- Users have one or more Credentials that they use to authenticate with the ngrok service.
- Users are not uniquely owned by an account. A User may be a member of more than one account.
- Users are subject to Role Based Access Control that allows you to restrict what actions Users may take within the account.
- Whenever a User takes an action within an account, the corresponding Event Log will attribute the event to the User by recording it as the Principal.
Dashboard Access
Users may log into the ngrok dashboard. You may configure your account to restrict how users authenticate to the dashboard. ngrok supports dashboard authentication via an email and password, an IdP like GitHub or Google or your own Single Sign-On IdP like Okta or Azure AD. Users may log into your ngrok Account’s dashboard. Normally, users enter an email and password to log into the ngrok dashboard but you may configure your ngrok account to require additional factors or require SSO. Service Users, by contrast, may not log into the dashboard.MFA
Users may add an additional authentication factor to protect their ngrok logins. At the moment, MFA only supports TOTP as an additional factor. You may configure your ngrok account to enforce that all users have MFA enabled.Single Sign-On
Users may also log in with a federated IdP via single sign-on. Your ngrok account may be configured to require the use of single sign-on for all of your users to log in. Consult the Single Sign-On documentation for additional details on configuring it.IP Restrictions
In addition to the normal authentication factors required to log into the ngrok dashboard, you may also configure your ngrok account to further restrict dashboard access to a set of IP CIDR blocks. Dashboard IP Restrictions should always be used in a warning mode first to test that you won’t accidentally lock yourself out of your account if you restrict access to IPs that you can’t use. IP Restrictions can be configured manually on the ngrok dashboard or programmatically via API with atype
of dashboard
.