OneLogin

Setting Up OneLogin Federated Single Sign-On (SSO)

In this page we will see the process of setting up Okta SSO with Codefresh. For the general instructions of SSO setup see the overview page.

Setting OneLogin as an Identity provider

To setup OneLogin for SSO do the following:

Step 1: Configure app on the OneLogin dashboard

Log in to the OneLogin Administration Dashboard, and click Apps > Add Apps.

OneLogin Dashboard

OneLogin Dashboard

Search for saml, and select SAML Test Connector (IdP w/attr).

Selecting SAML

Selecting SAML

Change the Display Name of your app. Click SAVE.

Changing the display name

Changing the display name

Go to the SSO tab, and copy the values for SAML 2.0 Endpoint (HTTP) and SLO Endpoint (HTTP). Click on the View Details link at the X.509 Certificate field.

Copying the values

Copying the values

Download the X.509 certificate onelogin.pem.

Downloading the certificate

Downloading the certificate

At this point, you will take the information you just collected and send to Codefresh:

  • SAML 2.0 Endpoint (HTTP)
  • SLO Endpoint (HTTP)
  • Certificate PEM file

Step 2: Configure OneLogin app with Codefresh service provider settings

On the app configuration tab configure the following:

  • Audience - urn:auth0:codefresh-login:frontline
  • Recipient - https://codefresh-login.auth0.com/login/callback?connection=frontline
  • ACS (Consumer) URL Validator - [-a-zA-Z0-9@:%._\+~#=]{2,256}\.[a-z]{2,6}\b([-a-zA-Z0-9@:%_\+.~#?&//=]*)
  • ACS (Consumer) URL - https://codefresh-login.auth0.com/login/callback?connection=frontline

Entering Codefresh Settings

Entering Codefresh Settings

This concludes the SSO setup for OneLogin.

See the overview page on how to test the integration, activate SSO for collaborators and create sync jobs.