Movatterモバイル変換


[0]ホーム

URL:


Skip to content

Navigation Menu

Sign in
Appearance settings

Search code, repositories, users, issues, pull requests...

Provide feedback

We read every piece of feedback, and take your input very seriously.

Saved searches

Use saved searches to filter your results more quickly

Sign up
Appearance settings

Commit2b60a0d

Browse files
Merge pull request#283 from codefresh-io/one-login-saml-setup
One login saml setup
2 parentscc7d9b5 +3d4887c commit2b60a0d

File tree

1 file changed

+49
-7
lines changed

1 file changed

+49
-7
lines changed

‎_docs/administration/single-sign-on/sso-setup-saml2.md‎

Lines changed: 49 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -98,18 +98,60 @@ The mandatory fields needed for SAML assertions are:
9898

9999
To configure users sync for SAML IDP you need to do the following:
100100

101-
1. SelectGSuite provider
102-
1. Enableauto Sync users and teams to Codefresh
101+
1. Selecta G Suite provider
102+
1. EnableAuto Sync users and teams to Codefresh
103103
1. Set JSON Keyfile, Admin Email and Sync interval
104104

105-
The instructions for getting the JSON Keyfile, and Admin Email are the same as for[Google SSO](https://codefresh.io/docs/docs/administration/single-sign-on/sso-google/#synchronize-teams-with-the-codefresh-cli).
105+
The instructions for getting the JSON Keyfile, and Admin Email are the same as for[Google SSO](https://codefresh.io/docs/docs/administration/single-sign-on/sso-google/#synchronize-teams-with-the-codefresh-cli).
106106

107107
>Notice that these settings are for the SaaS version of Codefresh. For an on-premise Codefresh setup you need to use the URLs that match your installation.
108108
109-
Once everything is finished, you[should test the integration]({{site.baseurl}}/docs/administration/single-sign-on/sso-setup-oauth2/#testing-your-identity-provider). Once it isworking proceed to the next steps that are:
109+
Once everything is finished, you[should test the integration]({{site.baseurl}}/docs/administration/single-sign-on/sso-setup-oauth2/#testing-your-identity-provider). Once it'sworking, proceed to the next steps that are:
110110

111111
*[Selecting SSO method for collaborators]({{site.baseurl}}/docs/administration/single-sign-on/sso-setup-oauth2/#selecting-sso-method-for-collaborators)
112112

113-
>Notice that Codefresh has an internal cache for SSO configurations and it might take up to 5 minutes for your changes to take effect.
114-
115-
113+
>Notice that Codefresh has an internal cache for SSO configurations and it might take up to five minutes for your changes to take effect.
114+
115+
##OneLogin SAML Setup
116+
117+
1. In OneLogin, go to the[Applications](https://cfsupport.onelogin.com/apps) Section.
118+
1. Select 'Add App' on the top right.
119+
1. Search for 'SAML Custom Connector' (advanced) and select it.
120+
1. Add a Display Name (the rest is optional) and Save.
121+
1. View the SSO Section.
122+
1. Open a New Tab and go to the[Single Sign-On](https://g.codefresh.io/account-admin/sso) settings in Codefresh.
123+
1. In Codefresh, select SAML for the Add Single Sign-On.
124+
* Display Name = any arbitrary name you want to give in this integration.
125+
* IDP Entry = SAML 2.0 Endpoint (HTTP) from the SSO section in OneLogin.
126+
* Application Certificate = X.509 Certificate from the SSO section in OneLogin.
127+
* Click View Details (preferable open in a new tab).
128+
* Under X.509 Certificate, click the copy button.
129+
* Paste the contents into the Application Certificate.
130+
* Remove the -----BEGIN CERTIFICATE----- and -----END CERTIFICATE-----.
131+
* Save.
132+
1. Click edit on the SAML integration we created.
133+
* Copy the Assertion URL
134+
1. In OneLogin, view the Configuration section.
135+
* Audience (EntityID) = g.codefresh.io
136+
* Recipient = Assertion URL
137+
* ACS (Consumer) URL Validator= Assertion URL but in Regex form. View OneLogin's[Setup Page](https://onelogin.service-now.com/support?id=kb_article&sys_id=c89fefdadb2310503de43e043996195a&kb_category=93e869b0db185340d5505eea4b961934) for more info.
138+
* ACS (Consumer) URL = Assertion URL
139+
* Login URL =https://g.codefresh.io/login
140+
* SAML Initiator = Service Provider
141+
* Save
142+
1. In OneLogin, Go the[Users](https://cfsupport.onelogin.com/users) page.
143+
* Select the User
144+
* Go to Applications Section
145+
* Click the**+** to add
146+
* Select the SAML App (will show the Display Name from step 7)
147+
* Click Continue
148+
* Make sure NameID value = email address
149+
* Save
150+
151+
>Once the configuration finishes, please test the integration before enabling the SSO for all users.
152+
153+
154+
155+
156+
157+

0 commit comments

Comments
 (0)

[8]ページ先頭

©2009-2025 Movatter.jp