You signed in with another tab or window.Reload to refresh your session.You signed out in another tab or window.Reload to refresh your session.You switched accounts on another tab or window.Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: _docs/administration/single-sign-on/sso-setup-saml2.md
+49-7Lines changed: 49 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -98,18 +98,60 @@ The mandatory fields needed for SAML assertions are:
98
98
99
99
To configure users sync for SAML IDP you need to do the following:
100
100
101
-
1. SelectGSuite provider
102
-
1. Enableauto Sync users and teams to Codefresh
101
+
1. Selecta G Suite provider
102
+
1. EnableAuto Sync users and teams to Codefresh
103
103
1. Set JSON Keyfile, Admin Email and Sync interval
104
104
105
-
The instructions for getting the JSON Keyfile, and Admin Email are the same as for[Google SSO](https://codefresh.io/docs/docs/administration/single-sign-on/sso-google/#synchronize-teams-with-the-codefresh-cli).
105
+
The instructions for getting the JSON Keyfile, and Admin Email are the same as for[Google SSO](https://codefresh.io/docs/docs/administration/single-sign-on/sso-google/#synchronize-teams-with-the-codefresh-cli).
106
106
107
107
>Notice that these settings are for the SaaS version of Codefresh. For an on-premise Codefresh setup you need to use the URLs that match your installation.
108
108
109
-
Once everything is finished, you[should test the integration]({{site.baseurl}}/docs/administration/single-sign-on/sso-setup-oauth2/#testing-your-identity-provider). Once it isworking proceed to the next steps that are:
109
+
Once everything is finished, you[should test the integration]({{site.baseurl}}/docs/administration/single-sign-on/sso-setup-oauth2/#testing-your-identity-provider). Once it'sworking, proceed to the next steps that are:
110
110
111
111
*[Selecting SSO method for collaborators]({{site.baseurl}}/docs/administration/single-sign-on/sso-setup-oauth2/#selecting-sso-method-for-collaborators)
112
112
113
-
>Notice that Codefresh has an internal cache for SSO configurations and it might take up to 5 minutes for your changes to take effect.
114
-
115
-
113
+
>Notice that Codefresh has an internal cache for SSO configurations and it might take up to five minutes for your changes to take effect.
114
+
115
+
##OneLogin SAML Setup
116
+
117
+
1. In OneLogin, go to the[Applications](https://cfsupport.onelogin.com/apps) Section.
118
+
1. Select 'Add App' on the top right.
119
+
1. Search for 'SAML Custom Connector' (advanced) and select it.
120
+
1. Add a Display Name (the rest is optional) and Save.
121
+
1. View the SSO Section.
122
+
1. Open a New Tab and go to the[Single Sign-On](https://g.codefresh.io/account-admin/sso) settings in Codefresh.
123
+
1. In Codefresh, select SAML for the Add Single Sign-On.
124
+
* Display Name = any arbitrary name you want to give in this integration.
125
+
* IDP Entry = SAML 2.0 Endpoint (HTTP) from the SSO section in OneLogin.
126
+
* Application Certificate = X.509 Certificate from the SSO section in OneLogin.
127
+
* Click View Details (preferable open in a new tab).
128
+
* Under X.509 Certificate, click the copy button.
129
+
* Paste the contents into the Application Certificate.
130
+
* Remove the -----BEGIN CERTIFICATE----- and -----END CERTIFICATE-----.
131
+
* Save.
132
+
1. Click edit on the SAML integration we created.
133
+
* Copy the Assertion URL
134
+
1. In OneLogin, view the Configuration section.
135
+
* Audience (EntityID) = g.codefresh.io
136
+
* Recipient = Assertion URL
137
+
* ACS (Consumer) URL Validator= Assertion URL but in Regex form. View OneLogin's[Setup Page](https://onelogin.service-now.com/support?id=kb_article&sys_id=c89fefdadb2310503de43e043996195a&kb_category=93e869b0db185340d5505eea4b961934) for more info.
138
+
* ACS (Consumer) URL = Assertion URL
139
+
* Login URL =https://g.codefresh.io/login
140
+
* SAML Initiator = Service Provider
141
+
* Save
142
+
1. In OneLogin, Go the[Users](https://cfsupport.onelogin.com/users) page.
143
+
* Select the User
144
+
* Go to Applications Section
145
+
* Click the**+** to add
146
+
* Select the SAML App (will show the Display Name from step 7)
147
+
* Click Continue
148
+
* Make sure NameID value = email address
149
+
* Save
150
+
151
+
>Once the configuration finishes, please test the integration before enabling the SSO for all users.