StatusGator Support

Configure status page SSO with a custom SAML provider

Open navigation

Configure status page SSO with a custom SAML provider

StatusGator supports Single Sign-On (SSO) for private status pages using SAML 2.0. If your identity provider is not listed, select Other. The configuration fields and behavior are the same as the Okta setup.

Status page SSO allows viewers to authenticate with your identity provider before accessing a private status page.

Before you begin

  • Your status page must be set to Private

  • You must be on a plan that includes status page SSO

  • You must have administrator access in your identity provider

Step 1: Create a SAML application in your identity provider

Create a new SAML 2.0 application in your identity provider.

When prompted for service provider details, use the following values from your StatusGator status page SSO settings:

Single sign-on URL (ACS URL)

  • Found in your Status page SSO settings

Audience URI (SP Entity ID)

  • Found in your Status page SSO settings

Name ID format

  • EmailAddress

Application username / Name ID value

  • User email address

The ACS URL and Audience URI are unique to your status page and must be copied exactly as shown in StatusGator.

If your provider asks for a default relay state, leave it blank unless required.

Step 2: Configure attribute statements

Ensure the following attribute is included in the SAML assertion:

Required attribute

  • email

    • Value: User’s email address

The email value is used to identify the user accessing the private status page.

Optional attributes if supported:

  • first_name

  • last_name

Step 3: Copy your identity provider values

After creating the SAML application, copy the following from your identity provider:

  • Identity provider issuer (Entity ID)

  • Identity provider single sign-on URL

  • X.509 certificate

You will enter these values into StatusGator.

Step 4: Configure SSO for your status page

In StatusGator:

  1. Go to Status page
  2. Open the SSO settings under Privacy tab
  3. Choose Other as the provider
  4. Enter:
    • Identity provider issuer
    • Identity provider SSO URL
    • X.509 certificate
  5. Click Save
  6. Enable SSO
  7. Click Save again

If you have any questions or problems, please email us or submit a ticket.

Did you find it helpful? Yes No

Send feedback
Sorry we couldn't be helpful. Help us improve this article with your feedback.