BugBase Documentation
  • 👋Welcome to BugBase Docs
  • Overview
    • 💡What we do
    • ⚡Changelogs
    • ✨Our Features
    • 📂Programs at BugBase
      • Vulnerability Disclosure Program (VDP)
      • Bug Bounty Program
      • Private Bounty Program
      • Pentest Program (VAPT)
  • Report Lifecycle
    • Bug Report
    • Report Status
  • How To
    • 👨‍💻Invite Organization Members to BugBase (RBAC)
    • 🚩Setup a Campaign for better program engagement
    • 🐛Submit a Bug Report on BugBase
    • 📑Create a Bug Bounty Program on BugBase
    • ⬇️Download the mobile app
  • Company Guide
    • 👨‍💼Create a Company Account
    • 🧭Navigation
    • 🛡️Assets Dashboard
    • 🗝️Credential Vaults
      • Creating a Credential Vault
      • Adding Credentials to Vault
      • Connect Credential Vault to an Asset
      • Require Whitelisting for a Credential
    • 🔐VPN Servers
      • Create, Configure and Deploy VPN server
      • Monitor Live Statistics and Logs
    • 🗂️Programs Dashboard
      • ⛳Create a Program
    • 📢Customer Support
    • 💵Bounty Bin
    • ⚙️Company Settings
      • 👨‍🏫Profile
      • 🏢Organisation
      • 👨‍🏭Roles and Permissions
      • 🔐Security & Authentication
        • Multi-Factor Authentication
        • SSO with SAML
          • Okta SSO setup via SAML
          • Google SSO setup via SAML
      • 🎨Customization
        • Automations
        • Report Tags
      • 📙Manage Access
    • 📈Insights Dashboard
    • 🔊Campaigns
    • 💲Understanding Currencies Used in BugBase
    • 🤝Whitelist
  • Program guide
    • Bug Bounty Dashboard
      • Program Reports Section
        • Report Components
        • Report Actions
        • Duplicating Reports
        • Assigning Swags
        • Assigning Bounties
        • Assigning Thanks to Reporters
        • Assigning Bonus Bounty
        • Automatic Response Generator using ChatGPT
      • Program Policy
        • Editing Program Policy
          • Best Practices For Designing Policy
          • Best Practices For Bounty Tables
      • Payouts
      • Settings
    • Private Bug Bounty Dashboard
      • Invite Hackers
      • Manage Credentials
    • VDP Dashboard
    • Pentest Dashboard
      • Pentest Overview
      • Vulnerabilities Section
        • Pentest Report Components
        • Pentest Report Actions
      • Global Pentest Chat
    • Competition Dashboard
      • Dashboard
      • Creating a Competition
        • Adding Challenges
      • Manage Competitions
        • Statistics
        • Leaderboard
        • Manage Users
  • Bounty Hunter Guide
    • Bounty Hunter Dashboard
    • Bounty Hunter Profile
    • Programs Directory
      • Program Policy Page
      • Credentials
      • VPN Access
      • Whitelist
      • Collaborate
    • Bounty Hunter Reports Section
      • Submitting Reports
      • Interaction with Program Representees
      • Collaboration
      • Response Generation through ChatGPT on Report Chat
    • Competitions
    • Discord Community
    • Leaderboard
    • Multi-Factor Authentication
    • Settings
      • Verify KYC
    • Email Alias
    • 🚀Apollo Community
  • Integrations
    • 🔗Supported Integrations
    • Webhooks
    • JIRA
      • Creating a JIRA Issue
    • Slack
      • Managing Integration
    • Microsoft Teams
    • Github
    • Asana
    • Sumo Logic
    • PagerDuty
  • on-premise
    • Running Automated Testing
    • Sandbox Environment
Powered by GitBook
On this page
  • Supported Providers
  • Domain Verification
  • Configuring Single Sign-On through SAML
  • Setup

Was this helpful?

  1. Company Guide
  2. Company Settings
  3. Security & Authentication

SSO with SAML

BugBase offers Single Sign-on through SAML ( Security Assertion Markup Language ) Integration with Okta and Google.

PreviousMulti-Factor AuthenticationNextOkta SSO setup via SAML

Last updated 12 months ago

Was this helpful?

Supported Providers

BugBase supports Single Sign-On (SSO) through Security Assertion Markup Language 2.0 (SAML 2.0) for these providers:

Domain Verification

In order to configure single sign-on via SAML, you need to verify ownership of the domain for your program.

To verify the ownership of domain:

  1. Navigate to Your Main Company Dashboard > Settings > Domains.

  2. Click on Add New Domain.

  1. Enter your domain and click Save.

  1. Now Add the TXT record shown on your Domain Management portal. After adding the TXT record click on Verify.

Once your domain is successfully verified, the status of your domain will be changed to Verified. You can continue to configure your SAML settings.

Configuring Single Sign-On through SAML

Setup

To configure Single Sign-On through SAML:

  1. Navigate to Your Main Company Dashboard > Settings > Security & Authentication.

  2. Click on Enable SAML single sign-on authentication.

  1. A Set-up modal will pop-up, click on Setup SAML.

  1. Next Click on Enter Configuration.

  1. Enter the information from the third-party tool for the following fields:

Field
Details

Domain

A Domain is required for SAML authentication. Select a Domain from the list of verified domains. This domain will be used to login with SSO.

Single Sign On URL

The URL from your SAML provider to initiate a single sign-on attempt, sometimes called the login URL.

X509 Certificate

The certificate from your SAML provider to verify the single sign-on response.

  1. Click Save.

  2. Next you will asked to test your SAML Configuration, Clicking on Test and Enable will log you out of your current session and once you successfully login using SSO, your Single Sign-On will be Enabled.

Single Logout: BugBase only supports logouts Identity Provider (IdP) initiated logouts, that is logging out of BugBase will not log you out of your SSO provider.

⚙️
🔐
Okta