Movatterモバイル変換


[0]ホーム

URL:


Skip to content

Navigation Menu

Sign in
Appearance settings

Search code, repositories, users, issues, pull requests...

Provide feedback

We read every piece of feedback, and take your input very seriously.

Saved searches

Use saved searches to filter your results more quickly

Sign up
Appearance settings

Commitc50c518

Browse files
authored
Merge pull request#518 from codefresh-io/mnmlluke-okta-saml
Add Okta SAML documentation
2 parentsf600ece +a622bae commitc50c518

File tree

5 files changed

+70
-4
lines changed

5 files changed

+70
-4
lines changed

‎_data/nav.yml‎

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -507,6 +507,8 @@
507507
sub-pages:
508508
-title:JumpCloud
509509
url:/saml-jumpcloud
510+
-title:Okta
511+
url:/saml-okta
510512
-title:OneLogin
511513
url:/saml-onelogin
512514
-title:PingID SSO

‎_docs/single-sign-on/saml/saml-jumpcloud.md‎

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -8,8 +8,7 @@ toc: true
88

99
##Setup Instructions
1010

11-
Below describes how to set up JumpCloud for Single Sing On with Codefresh using SAML. If you do not have the SAML option, please create a support ticket enable SAML for the account account.
12-
11+
Below describes how to set up JumpCloud for Single Sign-On with Codefresh using SAML. If you do not have the SAML option, please create a support ticket enable SAML for the account.
1312
###In Codefresh
1413

1514
1. Go to Account settings > Single Sign On
Lines changed: 65 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,65 @@
1+
---
2+
title:Okta (SAML)
3+
description:Setting Up Okta via SAML
4+
group:single-sign-on
5+
sub_group:saml
6+
toc:true
7+
---
8+
9+
##Set up SSO for Okta with SAML
10+
Below describes how to set up Okta for Single Sign-On with Codefresh using SAML.
11+
>If you do not have the SAML option, please create a support ticket enable SAML for the account.
12+
13+
###Create a SAML account in Codefresh
14+
Create a SAML account in Codefresh to get the required information to create an integration for Codefresh in Okta.
15+
16+
1. Go to**Account Settings > Single Sign-On**.
17+
1. Click**Add Single Sign On**, and select**SAML**.
18+
1. Define the following:
19+
-**Display Name**: Any name you want to call the integration.
20+
-**IDP Entry**: Type in any character.
21+
-**Application Cert**: Type in any character.
22+
1. Click**Save**, and then**Edit** so you can copy the information.
23+
24+
###Configure settings SAML for Codefresh in Okta
25+
26+
1. Navigate to**Applications**.
27+
1. Select**Create App Integration > SAML2.0**, and click**Next**.
28+
1. General Settings:
29+
- Fill in the Name and any other settings you want
30+
- Click**Next**.
31+
1. Configure SAML:
32+
-**Single Sign On URL**: The Assertion URL / Callback URL in Codefresh
33+
-**Audience URL**:`g.codefresh.io`
34+
-**Name ID Format**:`EmailAddress`
35+
- Attribute Statements
36+
- Leave "Name Format" as Unspecified
37+
-**firstName**:`user.firstName`
38+
-**lastName**:`user.lastName`
39+
-**email**:`user.email`
40+
- Click**Next**.
41+
1. Feedback
42+
- Fill this out if showing
43+
- Finish
44+
1. Sign On Tab
45+
- Select**View SAML Setup Instructions** on the right hand side
46+
- Keep this open as we need it to complete the setup for Okta in Codefresh.
47+
48+
###Configure SSO settings for OKta in Codefresh
49+
50+
Complete SSO setup for Okta via SMAL in Codefresh.
51+
52+
1.**IDP Entry**: Identity Provider Single Sign-On URL in Okta.
53+
1.**Application Certificate**: The X.509 Certificate
54+
-**Note**: you will get a warning when editing the Certificate section
55+
- Include the`-----BEGIN CERTIFICATE-----` and`-----END CERTIFICATE-----`
56+
1. Click**Save**.
57+
58+
##Test SSO Connection
59+
60+
Now test the SSO with a test user in a different browser or private/incognito browser to make sure it is working.
61+
62+
1. Go to Account Settings > User & Teams.
63+
1. Locate a test user.
64+
1. On the SSO Column, select the SSO name to enable SSO for the user.
65+
1. In a different browser or private/incognito browser window use the Corporate SSO option to log in.

‎_docs/single-sign-on/saml/saml-onelogin.md‎

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ toc: true
88

99
##Setup Instructions
1010

11-
Below describes how to set up OneLogin for SingleSingOn with Codefresh using SAML. If you do not have the SAML option, please create a support ticket enable SAML for the account account.
11+
Below describes how to set up OneLogin for SingleSign-On with Codefresh using SAML. If you do not have the SAML option, please create a support ticket enable SAML for the account.
1212

1313
###In OneLogin
1414

‎_docs/single-sign-on/saml/saml-pingidsso.md‎

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ toc: true
88

99
##Setup Instructions
1010

11-
Below describes how to set up PingID SSO for SingleSingOn with Codefresh using SAML. If you do not have the SAML option, please create a support ticket to enable SAML for the account.
11+
Below describes how to set up PingID SSO for SingleSign-On with Codefresh using SAML. If you do not have the SAML option, please create a support ticket to enable SAML for the account.
1212

1313
>Note: This is for PingID SSO and not PingID Federate. Steps can be used as a general guide for Ping Federate.
1414

0 commit comments

Comments
 (0)

[8]ページ先頭

©2009-2025 Movatter.jp