Movatterモバイル変換


[0]ホーム

URL:


Skip to content

Navigation Menu

Sign in
Appearance settings

Search code, repositories, users, issues, pull requests...

Provide feedback

We read every piece of feedback, and take your input very seriously.

Saved searches

Use saved searches to filter your results more quickly

Sign up
Appearance settings

Commitcd31cfb

Browse files
SSO updates
Clarifications for SSO instructions.
1 parent84a36ed commitcd31cfb

File tree

1 file changed

+17
-16
lines changed

1 file changed

+17
-16
lines changed

‎_docs/administration/single-sign-on/sso-setup-saml2.md‎

Lines changed: 17 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ toc: true
1717
1. Have your account set up with Codefresh enterprise plan.
1818
2. Ensure you have a working SAML 2.0 compliant Identity Provider (IdP).
1919
3. Identify someone in your organization who is familiar with configuring and managing your organization's IdP.
20-
4. Ensure that your IdP's system clock is synchronized with a reliable time source. If it is not, tokens generated will be unusable and SSO will fail.
20+
4. Ensure that your IdP's system clock is synchronized with a reliable time source. If it's not, tokens generated will be unusable and SSO will fail.
2121

2222
{:.text-secondary}
2323
##Summary of Federated SSO Setup
@@ -56,18 +56,18 @@ Once Federated SSO has been configured, the process works as follows:
5656
<divclass="bd-callout bd-callout-info"markdown="1">
5757
Note
5858

59-
Steps 2 to 7happen in the background and are transparent to the user.
59+
Steps 2 to 7happens in the background and are transparent to the user.
6060
</div>
6161

6262
1. A user logs in to Codefresh and enters their email
63-
2. The user is redirected to Codefresh Service Provider (SP) to initiate SSO.
64-
3. The user’s browser is then redirected to the customer IdP.
65-
4. Once authenticated by the corporate side, a SAML token is sent to the user’s browser.
66-
5. The SAML assertion is then forwarded to Codefresh SP.
67-
6. If you are a valid Codefresh user for this SSO connection, an SSO token is returned to the user’s browser.
68-
7. The user’s browser then returns a token to Codefresh and access is granted for your account.
63+
2. The user is redirected to Codefresh Service Provider (SP) to initiate SSO
64+
3. The user’s browser is then redirected to the customer IdP
65+
4. Once authenticated by the corporate side, a SAML token is sent to the user’s browser
66+
5. The SAML assertion is then forwarded to Codefresh SP
67+
6. If you are a valid Codefresh user for this SSO connection, an SSO token is returned to the user’s browser
68+
7. The user’s browser then returns a token to Codefresh and access is granted for your account
6969

70-
##Settingup SAMLintegration
70+
##SettingUp SAMLIntegration
7171

7272
Go to your SSO settings by clicking on*Account settings* on the left sidebar in the Codefresh UI and then selecting*Single Sign-on* again from the left sibar (or visit directly[https://g.codefresh.io/account-admin/sso](https://g.codefresh.io/account-admin/sso))
7373

@@ -77,23 +77,24 @@ Fill in the fields:
7777

7878
**Client Name* - leave the field empty and it will get an autogenerated value once you save the settings.
7979
**Display Name* - any arbitrary name you want to give in this integration.
80-
**IDP entry* - The SSO endpoint of your Identity Provider.
81-
**Application Certificate* - The security certificate of your Identity Provider. Paste the value directly on the field. Do not convert to base64 or any other encoding by hand.
80+
**IDP Entry* - The SSO endpoint of your Identity Provider.
81+
**Application Certificate* - The security certificate of your Identity Provider. Paste the value directly on the field. Do not convert to base64 or any other encoding by hand.
82+
**Assertion URL* -`https://g.codefresh.io/api/auth/<your_codefresh_client_name>/callback​` (where ​<your_codefresh_client_name>​ is taken from the SSO configuration you created on the section above. It was automatically generated by Codefresh after saving the SSO settings).
8283

8384
Click the*SAVE* button and make sure to note down the`Client Name` that was autogenerated.
8485

8586
Then in the settings of your Identity Provider create a new Service Provider and provide the following:
8687

87-
**Service Provider SSOendpoint* -`https://g.codefresh.io/api/auth/<your_codefresh_client_name>/callback` (where ​`<your_codefresh_client_name>​` is taken from the SSO configuration you created on the section above. It was automatically generated by Codefresh after saving the SSO settings.
88+
**Service Provider SSOEndpoint* -(Assertion consumer service URL) -`https://g.codefresh.io/api/auth/<your_codefresh_client_name>/callback`
8889
**Service Provider Entity ID* - ​`g.codefresh.io`
8990

9091
The mandatory fields needed for SAML assertions are:
9192

92-
1. firstName - user first name.
93-
1. lastName - user last name.
94-
1. email - user email.
93+
1. firstName - user first name
94+
1. lastName - user last name
95+
1. email - user email
9596

96-
>Notice that these settings are for theSAAS version of Codefresh. For an on-premises Codefresh setup you need to use the URLs that match your installation.
97+
>Notice that these settings are for theSaaS version of Codefresh. For an on-premise Codefresh setup you need to use the URLs that match your installation.
9798
9899
Once everything is finished, you[should test the integration]({{site.baseurl}}/docs/administration/single-sign-on/sso-setup-oauth2/#testing-your-identity-provider). Once it is working proceed to the next steps that are:
99100

0 commit comments

Comments
 (0)

[8]ページ先頭

©2009-2025 Movatter.jp