This document explains the process to enable SSO for DeepSource using SAML 2.0 with Okta as the Identity Provider (IdP).
For now, an admin (on Okta) needs to create a custom SAML integration for DeepSource Enterprise. The steps for which are as given:
On the left sidebar, choose "Applications" → "Applications", and click on "Create App Integration".
Choose "SAML 2.0" and click "Next".
Fill in the following details:
Field | Value |
---|---|
App Name | DeepSource Enterprise Server |
App Logo | Upload https://www.dropbox.com/sh/x7i2lrcodblyxuy/AACPCNPc0Z_TT3BlHpnRr5Hra?dl=0&preview=logo.png and click "Next" |
Assuming that DeepSource is hosted on "https://deepsource.foobar.com", fill in the following details accordingly:
Field | Values |
---|---|
Single sign on URL | https://deepsource.foobar.com/saml2/acs/ |
Audience URI (SP Entity ID) | https://deepsource.foobar/saml2/metadata/ |
Name ID format | EmailAddress (choose from drop down) |
Application username | Email (choose from drop down) |
In "Attribute Statements", add the following:
Field | Name format | Value |
---|---|---|
first_name | Basic | user.firstName |
last_name | Basic | user.lastName |
Under Feedback selection, choose:
On the next screen, go to the “SAML Signing Certificates” section. Copy the link for "Identity Provider Metadata" by clicking on Actions -> View IdP metadata
for the “SHA-2 Type” certificate.
<aside>
💡 It should be in the following format: https://<customer>.okta.com/app/<app-slug>/sso/saml/metadata
</aside>
Once SAML has been configured on Azure AD, navigate to “Config” tab in the Admin panel (replicated Kotsadm):