OneLogin SSO via SAML
Setting Up OneLogin via SAML
Set up SSO for OneLogin using SAML in Codefresh. For a general overview on SAML, see Setting up SAML2 Federated SSO.
NOTE
If you do not see SAML in the SSO list, please create a support ticket to enable SAML for your account.
Setting up SAML SSO for OneLogin includes:
- Adding the Codefresh application in OneLogin
- Configuring SSO settings for OneLogin via SAML in Codefresh
- Configuring SSO settings for Codefresh in OneLogin
Step 1: Add Codefresh application in OneLogin
- From the OneLogin toolbar, Applications section,and then select Add App on the top right.
- Search for SAML Custom Connector (advanced) and select it.
- Add a Display Name. Leave the other settings which are optional.
- Click Save.
- From the sidebar, select SSO and keep the tab open.
- Continue with Step 2: Configure SSO settings for OneLogin via SAML in Codefresh.
Step 2: Configure SSO settings for OneLogin via SAML in Codefresh
- In the Codefresh UI, from the toolbar click the Settings icon.
- In the sidebar, from Access & Collaboration, select Single Sign-On.
- Click Add single-sign-on, select SAML, and then click Next.
- Enter the connection details:
- Display Name: Any arbitrary name for this integration.
- IDP Entry: SAML 2.0 Endpoint (HTTP) from the SSO section in OneLogin.
- Application Certificate: X.509 Certificate from the SSO section in OneLogin.
Do the following:- Click and open View Details, preferably in a new tab.
- Under X.509 Certificate, click Copy.
- Paste the content into the Application Certificate.
- Remove the lines,
-----BEGIN CERTIFICATE-----
and-----END CERTIFICATE-----
.
- Provider: Leave empty.
- Click Add. The SAML integration for OneLogin is added and appears in the list of SSOs.
- In the Single Sign-On page, click the Edit icon for the OneLogin SAML integration you created.
- Copy the Assertion URL (client ID) that was automatically generated when you added the integration.
- Continue with Step 3: Configure SSO settings for Codefresh in OneLogin.
Step 3: Configure SSO settings for Codefresh in OneLogin
- Return to OneLogin, and from the sidebar, select Configuration.
- Enter the following:
- Audience (EntityID):
g.codefresh.io
. - Recipient: The Assertion URL you copied in the previous step.
- ACS (Consumer) URL Validator: The Assertion URL in Regex format. For more info on this, view OneLogin’s Setup Page.
- ACS (Consumer) URL: The Assertion URL.
- Login URL:
https://g.codefresh.io/login
- SAML Initiator: Service Provider.
- Click Save.
- Audience (EntityID):
- In OneLogin, go to the Users page, and do the following:
- Select the User.
- Go to Applications, and click +.
- Select the SAML App with the Display Name you entered in Codefresh.
- Click Continue.
- Make sure the NameID is set to the email address.
- Click Save.
You have completed SSO integration for OneLogin via SAML.
Test SSO Connection
Now test the SSO with a test user in a different browser or private/incognito browser to make sure the integration works as it should.
- In the Codefresh UI, on the toolbar, click the Settings icon and then select Account Settings.
- From the sidebar, below Access & Collaboration, select Users & Teams.
- Locate a test user, and from the SSO list, select the integration name to enable SSO for that user.
- In a different browser or private/incognito browser window use the Corporate option to log in.
Related articles
Federated Single Sign-On (SSO) overview
Setting up SAML2 Federated SSO
Common configuration for SSO providers