Configure status page SSO with a custom SAML provider
StatusGator supports Single Sign-On (SSO) for private status pages using SAML 2.0. If your identity provider is not listed, select Other. The configuration fields and behavior are the same as the Okta setup.
Status page SSO allows viewers to authenticate with your identity provider before accessing a private status page.
Before you begin
Your status page must be set to Private
You must be on a plan that includes status page SSO
You must have administrator access in your identity provider
Step 1: Create a SAML application in your identity provider
Create a new SAML 2.0 application in your identity provider.
When prompted for service provider details, use the following values from your StatusGator status page SSO settings:
Single sign-on URL (ACS URL)
Found in your Status page SSO settings
Audience URI (SP Entity ID)
Found in your Status page SSO settings
Name ID format
EmailAddress
Application username / Name ID value
User email address
The ACS URL and Audience URI are unique to your status page and must be copied exactly as shown in StatusGator.
If your provider asks for a default relay state, leave it blank unless required.
Step 2: Configure attribute statements
Ensure the following attribute is included in the SAML assertion:
Required attribute
email
Value: User’s email address
The email value is used to identify the user accessing the private status page.
Optional attributes if supported:
first_name
last_name
Step 3: Copy your identity provider values
After creating the SAML application, copy the following from your identity provider:
Identity provider issuer (Entity ID)
Identity provider single sign-on URL
X.509 certificate
You will enter these values into StatusGator.
Step 4: Configure SSO for your status page
In StatusGator:
- Go to Status page
- Open the SSO settings under Privacy tab
- Choose Other as the provider
- Enter:
- Identity provider issuer
- Identity provider SSO URL
- X.509 certificate
- Click Save
- Enable SSO
- Click Save again