- Semgrep Cloud Platform
- Team & Enterprise Tier
Single-sign on (SSO) configuration
SSO (single sign-on) is a Team/Enterprise tier feature. Semgrep Cloud Platform supports OpenID Connect / OAuth2 and SAML 2.0.
Add users through your Single Sign On provider without any additional steps in Semgrep Cloud Platform after you configure the SSO for your organization. The only required steps to ensure that users are added to Semgrep Cloud Platform are on the side of the SSO provider. There are no additional emails with links. When you follow the SSO steps, you are able to add users with one click.
OpenID Connect / OAuth2
To set up SSO:
- In Semgrep Cloud Platform, click Settings > Access > SSO, and then select Add OpenID SSO.
- Copy the
Redirect URL
. - Generate a
Client ID
andClient Secret
through your authentication provider and paste them. - From your authentication provider, copy the values for
Base URL/Domain
andEmail Domain
to Semgrep's Configure SSO: OpenID tab.Base URL/Domain
isOkta domain
for Okta SSO. - Provide a descriptive
Display Name
.
In case you encounter issues during the setup process, please reach out to support@semgrep.com for assistance.
SAML 2.0
SAML2.0 is configured through the Semgrep Cloud Platform Dashboard.
To set up SSO:
- From your authentication provider, create the SAML app.
- From the App Dashboard, click on Settings > Access > SSO
- Copy the
Single sign on URL
, andAudience URI
. Paste the values as needed in your authentication provider. The Provider ID value will be your organization's slug in Settings > Deployment, - From your authentication provider, add in two attribute statements
name
andemail
. - From your authentication provider, copy your
IdP SSO URL
,IdP Issuer ID
, andX509 Certificate
to Semgrep's Configure SSO: SAML tab. - Provide a descriptive
Display Name
.
If you encounter issues during the setup process, reach out to support@semgrep.com for assistance.
Setting up SAML SSO with Azure Active Directory
- An existing Azure Active Directory account.
- Sufficient permissions within Azure Active Directory to create Enterprise Apps. See Azure AD roles.
Setting up SAML SSO using Azure Active Directory (Azure AD) consists of the following general steps:
- Creating a custom Enterprise App within Azure Active Directory.
- Setting up SAML SSO for your new Enterprise App.
- Adding users to your new Enterprise App.
Creating a custom Enterprise App
- Sign in to the Azure AD portal.
- Under Manage, click Enterprise applications.
- Click New application > Create your own application. A menu appears.
- Give your new application a name, such as
Semgrep SAML
. - Select Integrate any other application you don't find in the gallery (non-gallery).
- Click Create. This takes you to your new Enterprise Application's page.
You have now created a custom Enterprise App for Semgrep to integrate into Azure AD. This enables you to set up SAML SSO.
Setting up SAML SSO for your new Enterprise App
- From your new Enterprise App's page, Click Single-sign on > SAML tile. This takes you to the Set up Single Sign-On with SAML page.
- Under the Basic SAML Configuration form, click Edit to enter values for Entity ID and Reply URL. These values are retrieved from Semgrep Cloud Platform by performing the following steps:
- Go to Semgrep Cloud Platform Settings page, and then click Add SAML2 SSO to display the SAML2 form.
- Copy the Audience URL value from Semgrep Cloud Platform, then in Basic SAML Configuration, under Identifier (Entity ID) click the Add identifier and paste in the URL.
- Copy the SSO URL value from Semgrep Cloud Platform, then in Basic SAML Configuration, under Reply URL (Assertion Consumer Service URL) click the Add reply URL and paste in the URL.
- In the Basic SAML Configuration form, click Save.
- Under the Attributes & Claims form, click Edit > Add new claim.
- Enter
name
in the Name field. - From the Source attribute drop-down box, select
user.givenname
. - Click Save.
- Enter
- Under the Attributes & Claims form, click Edit > Add new claim.
- Enter
email
in the Name field. - From the Source attribute drop-down box, select
user.email
. - Click Save.
- Enter
- Fill out the values required by Semgrep Cloud Platform's SAML2 form (IdP SSO URL, IdP Issuer ID, X.509 Certificate) by copying the values from Azure AD's Set up Single Sign-On with SAML page. Perform the following steps:
- Copy the Login URL value from Azure AD to IDP SSO URL in Semgrep Cloud Platform.
- Copy Azure AD Identifier value to IdP Issuer ID in Semgrep Cloud Platform.
- In Set up Single Sign-On with SAML, next to Certificate (Base64) click Download.
- In Semgrep Cloud Platform, under X.509 Certificate, click Browse and then add the downloaded file.
- At the beginning of Semgrep Cloud Platform's SSO form, fill out Email Domain and Display Name.
- Click Create/Update Auth Provider at the beginning of of Semgrep Cloud Platform's SAML2 form.
You have now set up SAML configuration between Azure AD and Semgrep Cloud Platform.
Adding users to your new Enterprise App
To add users to the application in so they can log in with their domain emails, refer to Assign users and groups to an application.
Find what you needed in this doc? Join the Semgrep Community Slack group to ask the maintainers and the community if you need help, or check out other ways to get help.