Configure SAML
Continuous Delivery (CD) supports the use of Security Assertion Markup Language (SAML) authentication from a SAML identity provider (IDP). Once you configure your SAML IDP to integrate with Continuous Delivery (CD), you can use your chosen single sign-on tool to authenticate users to Continuous Delivery (CD).
Your enterprise SAML team must configure your organization's SAML IDP to communicate with Continuous Delivery (CD). Provide the SAML team with the Continuous Delivery SAML redirect URL for your installation:
<YOUR CD4PE WEB UI ENDPOINT>/cd4pe/saml-auth. The SAML
team uses this to register CD as an application with
permissions to interact with the IDP.Get this information from your enterprise SAML team:
- The IDP-initiated SSO URL that CD needs to direct user authentication requests.
- The IDP public signing certificate for CD.
- The SAML attribute names that come back in the SAML assertion for these fields: first name, last name, email address, and username. (Attribute mapping is explained in step 4, below.)
If your IDP cannot use the saml-auth endpoint for configuration, the following may be helpful:
- Entity ID: CD4PE
- Signing certificate: This is generated by the IDP or the team managing the IDP. The public cert is then saved in CD via a settings page in the CD root console.
- ACS (Assertion Consumer Service) URL:
<CD4PE WEB UI ENDPOINT>/cd4pe/saml-auth - Logout URL: We do not support a logout URL for SAML integrations, this can only be performed through the CD UI. If this is an optional config option in PingID, it can be left blank.
- Log into the root console by signing in as the root user or by selecting Root console from the workspaces menu at the top of the CD navigation bar.
- Click Settings and click the Single sign on tab if you are not already on it.
- Select SAML.
- Enter the required configuration information as per the instructions
below.
IDP-Initiated SSO URL
The unique URL created by the SAML IDP used by your organization that acts as a single sign-on (SSO) gateway for CD. Your enterprise SAML team provides this URL.
For Microsoft Entra ID, the IDP-initiated SSO URL is the User Access URL from the Properties page of the Entra ID application. The correct URL should be of the format:
https://launcher.myapps.microsoft.com/api/signin/<UUID>?tenantId=<UUID>Public Signing Certificate
The SAML IDP public signing certificate verifies SAML assertions from the IDP. Your enterprise SAML team provides this certificate. Paste the entirety of the certificate, including the header and footer, into this field.
This field is for a SAML certificate only. To use a custom certificate for CD overall, refer to Use custom TLS certificates.Attribute Mapping
The SAML assertion sends four attributes to CD. The Attribute Mapping matches attribute keys from the SAML IDP assertion to user accounts created by CD.
- First Name: The SAML attribute key for the user's first name.
- Last Name: The SAML attribute key for the user's last name.
- Email: The SAML attribute key for the user's email address. This is the unique user identifier, so each user's email address must be unique.
- Username: The SAML attribute key for the user's username in CD. Each username must be unique.
- Click Run Configuration Test to send a sample authentication query to your SAML IDP.
- If the configuration test is successful, you're ready to enable SAML
authentication for your CD instance, enable the
SAML configuration switch and click Save
Configuration.If the SAML IDP or the SAML information saved in CD is improperly configured, you might be locked out of Continuous Delivery (CD). If this happens, navigate to
<YOUR CD4PE WEB UI ENDPOINT>/root/login, sign in as the root user, disable the SAML configuration switch, and click Save Configuration.