OneLogin
Setting Up OneLogin Federated Single Sign-On (SSO)
In this page we will see the process of setting up Okta SSO with Codefresh. For the general instructions of SSO setup see the overview page.
Setting OneLogin as an Identity provider
To setup OneLogin for SSO do the following:
Step 1: Configure app on the OneLogin dashboard
Log in to the OneLogin Administration Dashboard, and click Apps > Add Apps.
Search for saml, and select SAML Test Connector (IdP w/attr).
Change the Display Name of your app. Click SAVE.
Go to the SSO tab and copy the values for SAML 2.0 Endpoint (HTTP) and SLO Endpoint (HTTP). Click on the View Details link at the X.509 Certificate field.
Download the X.509 certificate onelogin.pem
.
At this point, you will take the information you just collected and send to Codefresh:
- SAML 2.0 Endpoint (HTTP)
- SLO Endpoint (HTTP)
- Certificate PEM file
Step 2: Configure OneLogin app with Codefresh service provider settings
On the app configuration tab configure the following:
- Audience -
urn:auth0:codefresh-login:<company_name>
- Recipient -
https://codefresh-login.auth0.com/login/callback?connection=<company_name>
- ACS (Consumer) URL Validator -
[[email protected]:%._\+~#=]{2,256}\.[a-z]{2,6}\b([[email protected]:%_\+.~#?&//=]*)
- ACS (Consumer) URL -
https://codefresh-login.auth0.com/login/callback?connection=<company_name>
This concludes the SSO setup for OneLogin.
What to read next
See the overview page on how to test the integration, activate SSO for collaborators and create sync jobs.