SSO with SAML
BugBase offers Single Sign-on through SAML ( Security Assertion Markup Language ) Integration with Okta and Google.
Last updated
BugBase offers Single Sign-on through SAML ( Security Assertion Markup Language ) Integration with Okta and Google.
Last updated
BugBase supports Single Sign-On (SSO) through Security Assertion Markup Language 2.0 (SAML 2.0) for these providers:
In order to configure single sign-on via SAML, you need to verify ownership of the domain for your program.
To verify the ownership of domain:
Navigate to Your Main Company Dashboard > Settings > Domains.
Click on Add New Domain.
Enter your domain and click Save.
Now Add the TXT record shown on your Domain Management portal. After adding the TXT record click on Verify.
Once your domain is successfully verified, the status of your domain will be changed to Verified. You can continue to configure your SAML settings.
To configure Single Sign-On through SAML:
Navigate to Your Main Company Dashboard > Settings > Security & Authentication.
Click on Enable SAML single sign-on authentication.
A Set-up modal will pop-up, click on Setup SAML.
Next Click on Enter Configuration.
Enter the information from the third-party tool for the following fields:
Domain
A Domain is required for SAML authentication. Select a Domain from the list of verified domains. This domain will be used to login with SSO.
Single Sign On URL
The URL from your SAML provider to initiate a single sign-on attempt, sometimes called the login URL.
X509 Certificate
The certificate from your SAML provider to verify the single sign-on response.
Click Save.
Next you will asked to test your SAML Configuration, Clicking on Test and Enable will log you out of your current session and once you successfully login using SSO, your Single Sign-On will be Enabled.
Single Logout: BugBase only supports logouts Identity Provider (IdP) initiated logouts, that is logging out of BugBase will not log you out of your SSO provider.