Configure admin SSO with a custom SAML provider
StatusGator supports Single Sign-On (SSO) for admin users using SAML 2.0. If your identity provider is not listed, select Other.
Before you begin
- You must be on a plan that includes SSO
- You must have administrator access in your identity provider
- Users must already be invited to StatusGator
Step 1: Create a SAML application in your identity provider
Create a new SAML 2.0 application in your identity provider and enter the following service provider details:
Single sign-on URL
Audience URI (SP Entity ID)
Name ID format
EmailAddress
Application username / Name ID value
User email address
If your provider asks for a default relay state, leave it blank unless required.
Step 2: Configure attribute statements
Ensure the following attribute is included in the SAML assertion:
Required attribute
- email
- Value: User’s email address
- Must exactly match the invited email in StatusGator
Optional attributes
- first_name
- last_name
If the email value does not match an invited user, login will fail.
Step 3: Copy your identity provider values
After creating the SAML application, copy the following from your identity provider:
- Identity provider issuer (Entity ID)
- Identity provider single sign-on URL
- X.509 certificate
You will enter these values into StatusGator.
Step 4: Configure SSO in StatusGator
- Log in as an admin
- Go to Team management
- Select Authentication options
- Under Configure single sign-on, choose Other
- Enter:
Identity provider issuer
Identity provider SSO URL
X.509 certificate
- Click Save
- Enable SSO
- Click Save again
We recommend testing SSO before enforcing it for all users.