Movatterモバイル変換


[0]ホーム

URL:


Skip to content

Navigation Menu

Sign in
Appearance settings

Search code, repositories, users, issues, pull requests...

Provide feedback

We read every piece of feedback, and take your input very seriously.

Saved searches

Use saved searches to filter your results more quickly

Sign up
Appearance settings

Commitb726dea

Browse files
adding OneLogin SAML
1 parent7f057d6 commitb726dea

File tree

1 file changed

+11
-5
lines changed

1 file changed

+11
-5
lines changed

‎_docs/administration/single-sign-on/sso-setup-saml2.md‎

Lines changed: 11 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -98,18 +98,24 @@ The mandatory fields needed for SAML assertions are:
9898

9999
To configure users sync for SAML IDP you need to do the following:
100100

101-
1. SelectGSuite provider
102-
1. Enableauto Sync users and teams to Codefresh
101+
1. Selecta G Suite provider
102+
1. EnableAuto Sync users and teams to Codefresh
103103
1. Set JSON Keyfile, Admin Email and Sync interval
104104

105-
The instructions for getting the JSON Keyfile, and Admin Email are the same as for[Google SSO](https://codefresh.io/docs/docs/administration/single-sign-on/sso-google/#synchronize-teams-with-the-codefresh-cli).
105+
The instructions for getting the JSON Keyfile, and Admin Email are the same as for[Google SSO](https://codefresh.io/docs/docs/administration/single-sign-on/sso-google/#synchronize-teams-with-the-codefresh-cli).
106106

107107
>Notice that these settings are for the SaaS version of Codefresh. For an on-premise Codefresh setup you need to use the URLs that match your installation.
108108
109-
Once everything is finished, you[should test the integration]({{site.baseurl}}/docs/administration/single-sign-on/sso-setup-oauth2/#testing-your-identity-provider). Once it isworking proceed to the next steps that are:
109+
Once everything is finished, you[should test the integration]({{site.baseurl}}/docs/administration/single-sign-on/sso-setup-oauth2/#testing-your-identity-provider). Once it'sworking, proceed to the next steps that are:
110110

111111
*[Selecting SSO method for collaborators]({{site.baseurl}}/docs/administration/single-sign-on/sso-setup-oauth2/#selecting-sso-method-for-collaborators)
112112

113-
>Notice that Codefresh has an internal cache for SSO configurations and it might take up to5 minutes for your changes to take effect.
113+
>Notice that Codefresh has an internal cache for SSO configurations and it might take up tofive minutes for your changes to take effect.
114114
115+
##OneLogin SAML Setup
116+
117+
1. In OneLogin, go to the[Applications](https://cfsupport.onelogin.com/apps) Section.
118+
1. Select 'Add App' on the top right.
119+
1. Search for 'SAML Custom Connector' (advanced) and select it.
120+
1. Add a Display Name (the rest is optional) and Save.
115121

0 commit comments

Comments
 (0)

[8]ページ先頭

©2009-2025 Movatter.jp