StatusGator supports enterprise Single Sign On (SSO) using the Security Assertion Markup Language (SSO). SAML is an open standard for exchanging authentication and authorization data between parties. SAML requires an identity provider (in this case, Azure) and a service provider, in this case StatusGator.
StatusGator SAML SSO has the following benefits:
- Users have have a single identity managed by your SAML Identity Provider.
- One click access to StatusGator from your Identity Provider dashboard.
- Create a new Web App using the Google Admin.
- Configure the web app for SSO with StatusGator.
- Configure StatusGator to use Google for SSO for your organization.
Open the Apps/ Web and mobile apps area in your Google Admin.
Click to add a new custom SAML application:
Call your application StatusGator SSO, and feel free to use this logo for the application:
Click continue on the App Details page, and the Google Identity Provider details page, you'll need to use the following values on the Service Provider Details page:
ACS URL: http://statusgator.com/users/saml/auth
Entity ID: https://statusgator.com (note the lack of a trailing slash)
Next add the following mappings:
Sign in to your StatusGator account using your email address and password. Once logged in click the Organization link in main drop down menu located at the upper right corner of the page. From there, click Add SSO. If you do not see an Add SSO link here, email firstname.lastname@example.org to request access to SSO.
You will be presented with the following form:
The values needed are the Entity ID, Sign On URL, Sign Out URL and IDP Certificate. To find these click the Download Metadata link:
Copy the SSO URL from The StatusGator SSO Google application metadata to the Sign In URL and Sign Out URL fields in StatusGator. Similarly, copy the Entity ID and certificate like so:
Your StatusGator SSO using Google is now configured. Users granted access to StatusGator can now sign in!