Canyon
Book a Demo
Canyon/Docs/Authentication & authorization
Platform

Authentication & authorization

Canyon plugs into your existing identity provider via SAML 2.0 or OIDC. Once signed in, users carry their roles and attributes into every generated app. Permissions are enforced at the semantic data layer, down to the row and column.

BetaUpdated April 2026ReferenceCanyon v1.0

BetaThese docs are in beta
Expect gaps and drift from the live product. Something unclear or missing? Grab 30 minutes with the team and we will walk you through it.
Talk to support

Identity & SSO

Users sign in with the identity provider you already run. Canyon supports SAML 2.0 and OIDC out of the box, so any major IdP slots in without custom work. Groups and attributes from your IdP flow through to Canyon and become the source of truth for every permission decision.

Supported identity providers

Okta
SAML 2.0 + OIDC
Live
Microsoft Entra ID
SAML 2.0 + OIDC
Live
Google Workspace
OIDC
Live
Auth0
OIDC
Live
Ping Identity
SAML 2.0
Alpha
OneLogin
SAML 2.0
Alpha
Keycloak (self-hosted)
OIDC
Alpha
Other SAML / OIDC IdP
Usually wired in days
On request
Need another IdP?
If your provider isn’t listed, tell us. New SAML / OIDC integrations are typically live within days, not quarters. We also support custom attribute mappings and just-in-time provisioning on all plans.

How identity flows through Canyon

┌──────────────────────────────────────────────────────────────────────────────┐
│  IDENTITY FLOW                                                               │
│                                                                              │
│    User ──► Your IdP (Okta / Entra ID / Google / …) ──► Canyon               │
│                                                          │                   │
│                                                          ▼                   │
│                                           Identity, groups, attributes       │
│                                                          │                   │
│              ┌───────────────────────────────────────────┴────────────────┐  │
│              ▼                                                            ▼  │
│       RBAC (roles)                                               ABAC (attrs) │
│              │                                                            │  │
│              └───────────────────────────────┬────────────────────────────┘  │
│                                              ▼                               │
│                       Canyon semantic data layer enforces                    │
│                       row- and column-level permissions on                   │
│                       every query, for every generated app.                  │
│                                                                              │
│  • Short-lived tokens, rotated automatically                                 │
│  • Every access logged to an immutable audit trail                           │
│  • Service accounts inherit the same RBAC/ABAC rules                         │
└──────────────────────────────────────────────────────────────────────────────┘

Session & token hygiene

  • Short-lived access tokens, rotated automatically. No long-lived secrets on devices.
  • Refresh-token rotation with reuse detection: a stolen refresh token invalidates the entire session family.
  • Explicit session revocation from the admin console; effective within seconds across every app.
  • Service and agent accounts inherit the same identity and scope model as human users.

Roles & permissions

Canyon is multi-tenant by design. A user may belong to any number of organizations with different roles in each. Organizations contain teams, teams contain projects, and every project carries its own role assignment. Permissions resolve to the most specific scope — a projectEDITOR role overrides an organization MEMBER role.

Organization roles

RolePermissions
OWNERFull control, including delete.
ADMINManage members and teams.
MEMBERCreate projects and apps.
VIEWERRead-only access.

Project roles

RolePermissions
OWNERFull control plus sharing.
EDITORRead and modify the app, its data contracts and its deployment.
VIEWERRead-only access to app and data.
Custom role sets
Enterprise customers can define additional roles (for example AUDITOR or DATA_STEWARD) with bespoke permission matrices. Contact us to scope a custom role model for your org.

ABAC & data scoping

Roles are only half the story. Every attribute your IdP exposes — region, cost centre, plant, customer segment — can drive attribute-based access control inside Canyon. ABAC is enforced at the Canyon semantic data layer, which means every app, every agent, every query honours the same rules automatically.

Row-level permissions
Users only see records their IdP attributes allow. Regional ops see their region; global ops see everything.
Column-level permissions
Sensitive fields (PII, salary, margin) are masked per role and per attribute, not per app.
Policy-as-data
Permissions live in one governed place. Change a policy once, every app and agent picks it up on the next query.
Audit trail on every access
Every read, every write, every policy evaluation is logged to an immutable trail. Exportable to your SIEM.

Resource visibility

Every Canyon resource — an app, a data contract, a deployment — carries a visibility label in addition to its RBAC and ABAC rules.

ORG_PUBLICVisible to all organization members.
TEAM_PRIVATEVisible to team members only.
ORG_PRIVATEVisible to admins and owners only.
Defence in depth
Visibility is enforced at the API gateway and at the semantic data layer. Even if a request bypasses the gateway, the data layer applies the same organization-scoped filters before any query reaches your warehouse.