Creating an Identity Hub In Your Organization
Identity Hub allows you to centralize user and permission management for your Organization, offering real-time syncing of users from your Identity Provider (IdP) or directory service, along with SAML-based single sign-on (SSO) and multi-factor authentication (MFA).
Central management of the following services are available at the Organization level:
- One-Click VPN (including Split-Tunnel Routing) using the Identity Endpoint App
- One-Click WiFi using the Identity Endpoint App
- Door Access Permissions and Unlock Methods
If you haven’t done so, start by Creating a UniFi Organization.
Before You Begin
|
|
Data Migration
When Identity Hub is enabled, your connected Identity Provider (IdP) or Directory Service becomes the source of truth for all users in the Organization. Please note the following behaviors:
-
Admin retention depends on if they were added using a UI Account, or locally.
- Admins added using their UI Account will be retained, regardless of their presence in the IdP.
- Local (offline) admins will not be retained.
-
User retention is based on email address:
- Only users with matching emails in your IdP will be retained.
- If the same email exists on multiple sites, those records will be merged into a single Organization-level user.
-
If using Door Access:
- You’ll select one site whose local user-to-unlock method mappings (e.g., PINs, NFC cards) will be retained and migrated.
- Unlock methods from all other sites must be manually reassigned or re-provisioned to users at the Organization level.
- License plates, face photos, and Touch Pass credentials will be retained across all sites
- If a user has multiple license plates, touch passes, or face photos, only one of each will be preserved.
- Access policies will be retained.
-
If any site is using Identity or Identity Enterprise:
- Identity Enterprise must be deactivated before proceeding.
- Users managed via non-Enterprise Identity (local Identity) will be migrated automatically after setup.
- One-Click VPN and WiFi assignments from non-Enterprise Identity will also be retained during this process.
Selecting an Identity Hub
As part of your Organization, one UniFi Host will act as the Identity Hub—orchestrating users, group permissions, and access policies across all other connected sites.
Any of the hosts listed below, running a minimum UniFi OS version of 4.2.8 or later:
- Enterprise Fortress Gateway (EFG)
- Dream Machine Pro / SE / Max
- CloudKey Enterprise
- UniFi Network Video Recorders (UNVR Pro and ENVR)
Note: For Organizations using Door Access, Access must also run version 3.2.50 or later
Getting Started
- Navigate to your Organization Manager using one of the following methods:
- Navigate to unifi.ui.com > select your Organization from the dropdown menu next to the search bar.
- Navigate directly to your organization’s domain(i.e., <your-org-domain>.ui.com).
- Navigate to Admins>Identity Hub>Get Started.
- Select a Host that will be your Organization’s Identity Hub.
- This device stores identity configurations and syncs with your Identity Provider.
- For best results, choose a high-availability host like an Enterprise Fortress Gateway configured with Shadow Mode.
- (Optional) Manually configure the Server Address and Port used for communication between Identity Hub and your IdP.
- If your Identity Hub has multiple public IPs, select which one to use.
- You can also choose Use Alternative Address to manually enter an IP or FQDN.
- If your UniFi Host does not have a public IP, create a port forwarding rule on the upstream gateway.
- <Upstream-Gateway-Public-IP>:9543 → <Identity-Hub-IP>:9543
- Integrate with your respective Identity Provider (IdP) or Directory Service.
- Microsoft Entra (Azure AD)
- Google Workspace
- LDAP / Active Directory
- JumpCloud (via LDAP)
-
(Door Access Deployments Only) Select the one site whose existing NFC Card and PIN assignments you want to retain.
- Unlock methods from all other sites will need to be reassigned or re-provisioned after setup
-
For full behavior details and recommendations, see Before You Begin .
- Assign permissions to users and onboard them to the Identity Endpoint App following the instructions here.
Troubleshooting if Unable to Set Up Identity Hub After Zone-Based Firewall Upgrade
If you're setting up Identity Hub on a UniFi Console behind a Gateway Console after upgrading to the Zone-Based Firewall (ZBF) feature, the setup may fail. This issue typically occurs because once a zone-based policy is applied, access to the UniFi Console via its gateway WAN IP and port (e.g., 9543) is blocked by default — including self-access.
To resolve this, you can choose one of the following workarounds:
Option 1: Manually Add a Self-to-Self Allow Policy
- Open the Gateway Console and go to Network Application > Settings > Policy Engine.
- Scroll down and click Create Policy.
- In Source Zone, select the affected zone.
- Set the Action to Allow.
- In Destination Zone, select the same zone.
- Under Port settings for the Destination Zone:
- Choose Specific.
- Enter your port forwarding port (e.g., 9543) as the allowed port.
Once this policy is added, the UniFi Console should be able to reach itself via your port forwarding port without any further issues.
Option 2: Move the Hub Console to a Different LAN
If you prefer not to modify firewall rules, another option is to relocate the UniFi Console to a LAN that is not assigned to the restricted zone. This allows communication to proceed without being blocked by zone-based restrictions.
Troubleshooting Identity Hub Setup Issues
-
Verify Hosting Console Requirements
- Ensure your hosting console firmware is v4.2.5 or later.
- Confirm the console model meets the requirements here.
- Make sure the console is powered on and connected to the internet.
-
Check Network Connectivity
- Test server address reachability
ping <server_address>- Success: Returns latency (ms) with 0% packet loss
- Failure: Shows timeout or unreachable
- Run the following command to test network communication between the hosted console and the server address
nc -zv <hosted_console_ip> <port> - Expected Output (Normal):
Connection to {hosted_console_ip} port {port} [tcp/*] succeeded -
If both (a) and (b) fail:
- Check Step 3 below for port or gateway forwarding issues.
- Verify local firewall settings or ISP restrictions aren’t blocking outbound connections. Contact your ISP if necessary.
- Test server address reachability
- Check Public IP and Port Forwarding
If your hosting console does not have a public IP, set up port forwarding.
-
If your upstream console is a UniFi Gateway
- Go to your Gateway’s Network Application > Settings > Policy Engine > Port Forwarding.
- Click Create Entry.
- Set a Rule Name.
- Under WAN Port and Forward Port, enter an unused port between 9450–9550.
- In Forward IP Address, enter your hosting console’s IP.
- Click Add.
- Return to the Identity Hub setup page, select the hosting console, enter your WAN IP and port, and try again.
- If your UniFi Gateway has Zone-Based Firewall enabled, follow the steps here to troubleshoot.
-
If your upstream console is a third-party gateway, follow the manufacturer’s manual or website for port forwarding instructions, and configure:
- External (WAN) Port: Any unused port between 9450–9550.
- Internal Port: Same as the selected WAN port.
- Internal IP Address: LAN IP of your hosting console.
-
Check your Identity Hub status:
- Run the following command to check Identity Hub status:
SSH root@{hosting_console_ip}thenucs test status - If the status shows stopped, restart it:
ucs restart - Return to the Identity Hub setup page and try again.
- Run the following command to check Identity Hub status:
- If the issue persists, contact Support with your hosting console’s support file.
Organization and Identity Hub Management
For more information, see Managing Your UniFi Organization.