Configuring Azure SSO
StatusGator supports enterprise Single Sign On (SSO) using the Security Assertion Markup Language (SSO). SAML is an open standard for exchanging authentication and authorization data between parties. SAML requires an identity provider (in this case, Azure) and a service provider, in this case StatusGator.
StatusGator SAML SSO has the following benefits:
• Users have have a single identity managed by your SAML Identity Provider.
• One click access to StatusGator from your Identity Provider dashboard.
Note: Currently StatusGator only supports service provider initiated single sign on with Azure. Identity provider initiated single sign on is not supported. Users will need to be invited to StatusGator by their Organization Admin using their email address before being able to use single sign on.
Setup
1. As an admin in your Azure account, create a new enterprise application. This can be done in the Enterprise Applications area in Microsoft Azure.
2. Сhoose to create your own application as follows. Name your application (f.e StatusGator SSO) and hit Create.
3. Next choose to setup SSO.
4. Next choose SAML. From there edit the Basic SAML Configuration.
5. Next, in the 1st section Basic SAML Configuration, click Edit button.
6. Now configure the following values:
Identifier (Entity ID): https://statusgator.com (Note no trailing slash)
Reply URL: https://statusgator.com/users/saml/auth
Sign On URL: https://statusgator.com/users/saml/auth
Sign Out URL: https://statusgator.com/users/saml/auth
Once you entered information, hit Save.
7. To set up SSO for the StatusGator you'll need data from Section 3 and 4:
• Microsoft Entra Identifier
• Login URL
• Logout URL
• Certificate (Base 64), download it
8. Now, go back to StatusGator account, open Team members page, click on the Authentication tab and enable SSO option. Now use the data from the Azure account to fill out the form below.
- Identity Provider Entity ID – Microsoft Entra Identifier in Azure
- Sign On URL – Login URL in Azure
- Sign Out URL – Logout URL in Azure
- IDP Certificate – Download the Cerfificate (Base 64). To extract the code, you can drag the file into your browser tab and then copy the code.
The fingerprint and algorithm fields can be left blank.
9. Save your SSO settings, and Once setup, you'll need to associate users in your Okta Directory with StatusGator so they may log in.