You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardexpand all lines: docs/deployment/sso.md
+25-86
Original file line number
Diff line number
Diff line change
@@ -7,6 +7,7 @@ hide_title: true
7
7
tags:
8
8
- Deployment
9
9
- Semgrep AppSec Platform
10
+
- SSO
10
11
---
11
12
12
13
# Single-sign on (SSO) configuration
@@ -21,8 +22,8 @@ This article walks you through single-sign on (SSO) configuration. Semgrep suppo
21
22
22
23
## OpenID Connect / OAuth 2.0
23
24
24
-
:::warning
25
-
Semgrep AppSec Platform does not support using OpenID with Microsoft Entra ID. Follow the instructions for [setting up SAML SSO with Microsoft Entra ID](#set-up-saml-sso-with-microsoft-entra-id) instead.
25
+
:::note Microsoft Entra ID
26
+
Semgrep AppSec Platform does not support using OpenID with Microsoft Entra ID. Follow the instructions to [set up SAML SSO with Microsoft Entra ID](/kb/semgrep-appsec-platform/saml-microsoft-entra-id) instead.
26
27
:::
27
28
28
29
To set up SSO in Semgrep AppSec Platform:
@@ -47,104 +48,37 @@ If you encounter issues during the setup process, please reach out to [support@s
47
48
48
49
## SAML 2.0
49
50
51
+
:::note Google Workspace SAML
52
+
If you're using Google Workspace SAML, see [SAML Single Sign-on with Google Workspace](/docs/kb/semgrep-appsec-platform/saml-google-workspace) for specific guidance.
53
+
:::
54
+
50
55
SAML2.0 is configured through **Semgrep AppSec Platform**. To set up SSO:
51
56
52
57
1. Create a SAML app with your authentication provider.
53
58

54
-
1. With your authentication provider, add in two attribute statements: `name` and `email`.
59
+
2. With your authentication provider, add in two attribute statements: `name` and `email`.
55
60

56
-
1. Sign in to Semgrep AppSec Platform.
57
-
1. Navigate to **[Settings > Access > Login methods](https://semgrep.dev/orgs/-/settings/access/loginMethods)**.
58
-
1. Click **Add SSO configuration** and select **SAML2 SSO**.
59
-
1. Provide a **Display name** and the **Email domain**.
60
-
2. Copy the **SSO URL** and **Audience URL (SP Entity ID)**, and provide it to your authentication provider.
61
+
3. Sign in to Semgrep AppSec Platform.
62
+
4. Navigate to **[Settings > Access > Login methods](https://semgrep.dev/orgs/-/settings/access/loginMethods)**.
63
+
5. Click **Add SSO configuration** and select **SAML2 SSO**.
64
+
6. Provide a **Display name** and the **Email domain**.
65
+
7. Copy the **SSO URL** and **Audience URL (SP Entity ID)**, and provide it to your authentication provider.
61
66

62
-
3. From your authentication provider, copy your **IdP SSO URL** and **IdP Issuer ID** values, and download the **X509 Certificate**.
67
+
8. From your authentication provider, copy your **IdP SSO URL** and **IdP Issuer ID** values, and download the **X509 Certificate**.
63
68

64
-
4. Return to Semgrep AppSec Platform, and paste the **IdP SSO URL** and **IdP Issuer ID** values, and upload your **X509 Certificate**.
69
+
9. Return to Semgrep AppSec Platform, and paste the **IdP SSO URL** and **IdP Issuer ID** values, and upload your **X509 Certificate**.
65
70

66
-
5. Select the box next to **This SSO supports non-password authentication mechanisms (e.g. MFA, X509, PasswordLessPhoneSignin)** if applicable.
67
-
6. Click **Save** to proceed.
68
-
69
-
If you are using Google Workspace SAML, see [SAML Single Sign-on with Google Workspace](/docs/kb/semgrep-appsec-platform/saml-google-workspace) for more specific guidance.
71
+
10. Select the box next to **This SSO supports non-password authentication mechanisms (e.g. MFA, X509, PasswordLessPhoneSignin)** if applicable.
72
+
11. Click **Save** to proceed.
70
73
71
74
If you encounter issues during the setup process, [reach out to support](/docs/support) for assistance.
72
75
73
-
### Set up SAML SSO with Microsoft Entra ID
74
-
75
-
<!--
76
-
Semgrep AppSec Platform doesn't have an integration app in Microsoft Entra ID the way it does with Slack and GitHub.
77
-
So, the user has to create a custom app (integration) for SAML SSO.
78
-
We only use SOME steps in the documentation for Azure, so we'll have to make our own guide.
76
+
:::note Admin and org owner accounts
77
+
By default, Semgrep creates new SSO accounts with the **Member** role assigned. You can change the default role assigned to a new user by going to [Settings > Access](https://semgrep.dev/orgs/-/settings/access/defaults).
79
78
80
-
The following references are used:
81
-
82
-
-->
83
-
84
-
:::info Prerequisites
85
-
* An existing Microsoft Entra ID account.
86
-
* Sufficient permissions within Microsoft Entra ID to create enterprise apps. See [Microsoft Entra ID roles](https://learn.microsoft.com/en-us/azure/active-directory/roles/permissions-reference).
79
+
If you're an admin setting up SSO, and Semgrep creates an SSO account for you with the role of **Member**, you can elevate the permissions granted to your SSO account. To do so, log in to Semgrep with your admin account using the original login method, then [change the role](https://semgrep.dev/orgs/-/settings/access/members) of your newly created SSO account to **Admin**.
87
80
:::
88
81
89
-
Setting up SAML SSO using Microsoft Entra ID consists of the following general steps:
90
-
91
-
1. Create a custom **enterprise app** within Microsoft Entra ID.
92
-
2. Set up SAML SSO for your new enterprise app.
93
-
3. Add users to your new enterprise app.
94
-
95
-
#### Create a custom enterprise app
96
-
97
-
<!-- Rather than using portal.azure.com, which takes us to Azure Dashboard, sign in straight away to Microsoft Entra ID -->
98
-
99
-
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com/).
100
-
2. Use the search bar to find and navigate to **enterprise applications**.
3. In the **Basic SAML Configuration** section, click **Edit**. Provide the **Entity ID** and **Reply URL**. You can retrieve these values from Semgrep AppSec Platform by performing the following steps:
117
-
1. Sign in to Semgrep AppSec Platform.
118
-
2. Navigate to **[Settings > Access > Login methods](https://semgrep.dev/orgs/-/settings/access/loginMethods)**.
119
-
3. Click **Add SSO configuration** and select **SAML2 SSO**.
120
-
4. Copy the **Audience URL (SP Entity ID)** value from Semgrep AppSec Platform. Return to **Basic SAML Configuration**. Click **Add identifier** to paste this value as the **Identifier (Entity ID)**.
121
-
5. Copy the **SSO URL** value from Semgrep AppSec Platform. Return to **Basic SAML Configuration**. Click **Add reply URL** to paste this value as the **Reply URL (Assertion Consumer Service URL)**.
122
-
4. Click **Save** and close out of **Basic SAML Configuration**.
123
-
5. In the **Attributes and Claims** section, click **Edit**. You must add two claims. To add your first claim:
124
-
1. Click **Add new claim**.
125
-
2. Enter `name` in the **Name** field.
126
-
3. For the **Source attribute** drop-down box, select `user.displayname`.
127
-
4. Click **Save**.
128
-
6. To add your second claim:
129
-
1. Click **Add new claim**.
130
-
2. Enter `email` in the **Name** field.
131
-
3. From the **Source attribute** drop-down box, select `user.mail`.
132
-
4. Click **Save**.
133
-
7. Close out of **Attributes & Claims**.
134
-
8. Navigate to Semgrep AppSec Platform, and provide the values required by the SAML2 form:
135
-
1. Provide the **Display name** and the **Email domain** you are using for the integration.
136
-
2. Copy the **Login URL** value from Microsoft Entra ID and paste it in into Semgrep AppSec Platform's **IDP SSO URL** field.
137
-
3. Copy and paste the **Microsoft Entra ID Identifier** value into Semgrep AppSec Platform's **IdP Issuer ID** field.
138
-
4. In Entra ID's **SAML-based Sign-on** page, click **Download** to obtain the **Certificate (Base64)**.
139
-
5. In Semgrep AppSec Platform, under **Upload/Paste certificate**, click **Browse** and then select the certificate you downloaded.
9. Select the box next to **This SSO supports non-password authentication mechanisms (e.g. MFA, X509, PasswordLessPhoneSignin)** if applicable.
142
-
10. Click **Save** to proceed.
143
-
144
-
#### Add users to your new enterprise app
145
-
146
-
To add users to the application in so they can log in with their domain emails, refer to [Assign users and groups to an application](https://learn.microsoft.com/en-us/azure/active-directory/manage-apps/assign-user-or-group-access-portal).
147
-
148
82
## Turn off sign in with GitHub / GitLab
149
83
150
84
If you have SSO enabled, you can turn off login using GitHub or GitLab credentials. Doing so forces members of your organization to log in using an email address with an approved domain.
@@ -157,3 +91,8 @@ If you have SSO enabled, you can turn off login using GitHub or GitLab credentia
157
91
:::warning
158
92
Ensure that you have at least one user who can log in through SSO before disabling sign in with GitHub or GitLab.
159
93
:::
94
+
95
+
## See also
96
+
97
+
-[SAML SSO with Google Workspace](/docs/kb/semgrep-appsec-platform/saml-google-workspace)
98
+
-[SAML SSO with Microsoft Entra ID](/docs/kb/semgrep-appsec-platform/saml-microsoft-entra-id)
Copy file name to clipboardexpand all lines: docs/kb/semgrep-appsec-platform/saml-google-workspace.md
+1-1
Original file line number
Diff line number
Diff line change
@@ -5,7 +5,7 @@ tags:
5
5
- SSO
6
6
---
7
7
8
-
# SAML Single Sign-on with Google Workspace
8
+
# SAML SSO with Google Workspace
9
9
10
10
This article describes how to set up SAML Single Sign-on for Semgrep AppSec Platform with Google Workspace, including how to set up the necessary attribute mappings.
description: Learn how to set up SAML access to Semgrep AppSec Platform with Microsoft Entra ID.
3
+
tags:
4
+
- Semgrep AppSec Platform
5
+
- SSO
6
+
---
7
+
8
+
# SAML SSO with Microsoft Entra ID
9
+
10
+
This article describes how to set up SAML Single Sign-on for Semgrep AppSec Platform with Microsoft Entra ID.
11
+
12
+
<!--
13
+
Semgrep AppSec Platform doesn't have an integration app in Microsoft Entra ID the way it does with Slack and GitHub.
14
+
So, the user has to create a custom app (integration) for SAML SSO.
15
+
We only use SOME steps in the documentation for Azure, so we'll have to make our own guide.
16
+
17
+
The following references are used:
18
+
19
+
-->
20
+
21
+
:::info Prerequisites
22
+
* An existing Microsoft Entra ID account.
23
+
* Sufficient permissions within Microsoft Entra ID to create enterprise apps. See [Microsoft Entra ID roles](https://learn.microsoft.com/en-us/azure/active-directory/roles/permissions-reference).
24
+
:::
25
+
26
+
Setting up SAML SSO using Microsoft Entra ID consists of the following general steps:
27
+
28
+
1. Create a custom **enterprise app** within Microsoft Entra ID.
29
+
2. Set up SAML SSO for your new enterprise app.
30
+
3. Add users to your new enterprise app.
31
+
32
+
## Create a custom enterprise app
33
+
34
+
<!-- Rather than using portal.azure.com, which takes us to Azure Dashboard, sign in straight away to Microsoft Entra ID -->
35
+
36
+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com/).
37
+
2. Use the search bar to find and navigate to **enterprise applications**.
3. In the **Basic SAML Configuration** section, click **Edit**. Provide the **Entity ID** and **Reply URL**. You can retrieve these values from Semgrep AppSec Platform by performing the following steps:
54
+
1. Sign in to Semgrep AppSec Platform.
55
+
2. Navigate to **[Settings > Access > Login methods](https://semgrep.dev/orgs/-/settings/access/loginMethods)**.
56
+
3. Click **Add SSO configuration** and select **SAML2 SSO**.
57
+
4. Copy the **Audience URL (SP Entity ID)** value from Semgrep AppSec Platform. Return to **Basic SAML Configuration**. Click **Add identifier** to paste this value as the **Identifier (Entity ID)**.
58
+
5. Copy the **SSO URL** value from Semgrep AppSec Platform. Return to **Basic SAML Configuration**. Click **Add reply URL** to paste this value as the **Reply URL (Assertion Consumer Service URL)**.
59
+
4. Click **Save** and close out of **Basic SAML Configuration**.
60
+
5. In the **Attributes and Claims** section, click **Edit**. You must add two claims. To add your first claim:
61
+
1. Click **Add new claim**.
62
+
2. Enter `name` in the **Name** field.
63
+
3. For the **Source attribute** drop-down box, select `user.displayname`.
64
+
4. Click **Save**.
65
+
6. To add your second claim:
66
+
1. Click **Add new claim**.
67
+
2. Enter `email` in the **Name** field.
68
+
3. From the **Source attribute** drop-down box, select `user.mail`.
69
+
4. Click **Save**.
70
+
7. Close out of **Attributes & Claims**.
71
+
8. Navigate to Semgrep AppSec Platform, and provide the values required by the SAML2 form:
72
+
1. Provide the **Display name** and the **Email domain** you are using for the integration.
73
+
2. Copy the **Login URL** value from Microsoft Entra ID and paste it in into Semgrep AppSec Platform's **IDP SSO URL** field.
74
+
3. Copy and paste the **Microsoft Entra ID Identifier** value into Semgrep AppSec Platform's **IdP Issuer ID** field.
75
+
4. In Entra ID's **SAML-based Sign-on** page, click **Download** to obtain the **Certificate (Base64)**.
76
+
5. In Semgrep AppSec Platform, under **Upload/Paste certificate**, click **Browse** and then select the certificate you downloaded.
9. Select the box next to **This SSO supports non-password authentication mechanisms (e.g. MFA, X509, PasswordLessPhoneSignin)** if applicable.
79
+
10. Click **Save** to proceed.
80
+
81
+
## Add users to your new enterprise app
82
+
83
+
To add users to the application in so they can log in with their domain emails, refer to [Assign users and groups to an application](https://learn.microsoft.com/en-us/azure/active-directory/manage-apps/assign-user-or-group-access-portal).
0 commit comments