This guide provides step-by-step instructions on setting up Bitrise as a SAML application on Azure Active Directory (AD).
- an Azure AD administrator who is logged into Azure AD.
- a Bitrise Organization owner who is logged into his or her Bitrise Organization (with Org Elite subscription).
Adding Bitrise to Azure AD ⚓
Bitrise is not an integrated application in the Microsoft Azure portal so to set up SAML SSO with Azure, you’ll have to first add Bitrise as a non-gallery app to the portal.
- Log into your Azure AD account as an admin.
- Click the Azure Active Directory on the left menu.
Click Enterprise applications under Manage.
Click New Application to add Bitrise as a new app to your account.
Click the Non-gallery application tile to add Bitrise manually to Azure AD.
Type Bitrise in the Name field under Add your own application.
- Click the blue Add button at the bottom of the page.
You have successfully added Bitrise as an app to Azure AD. Let’s continue with configuring it as a the SAML app!
Configuring Bitrise as a SAML app ⚓
A more intricate part of the procedure is to set up SAML between the Bitrise app and Azure AD. We will be jumping back and forth from the Bitrise Organization account to the Azure portal so make sure both pages are available. In practice what this means is the Organization owner should be logged into Bitrise and the Azure AD admin should be logged into Azure AD portal.
If you have followed the steps above, by now you should be on the Overview page of the added app where you can further configure your app.
Let’s do this!
Adding users/groups to the app on Azure AD ⚓
Before setting up SAML to the app, you have to add all the users/groups to the app in Azure AD who will use SAML SSO to log into the Bitrise Organization. In other words, every Bitrise org member must be added as user in Azure AD.
- Select Users and groups from the left menu.
- Select all the users from the list so that Bitrise org members will be able to sign into Bitrise with SAML SSO.
- Click Select at the bottom of the page.
Click Assign at the bottom of the page.
You can see the list of added users:
Setting up SAML between the app and Azure AD ⚓
- Click Single sign-on on the left menu.
You will land on the Set up Single Sign-On with SAML - Preview page where you can further configure the fields by clicking on the pencil symbols.
- Click the pencil symbol at Basic SAML Configuration to edit two fields.
Add Bitrise as the Identifier (Entity ID).
Leave this window open! We will come back to it in a second.
- Head back to your Organization on Bitrise.
- Click the Single Sign On tab.
Click the Copy Link button to copy the Single Sign-on URL from your Bitrise.
- Let’s head back to the Basic SAML Configuration window of Azure AD.
Paste the URL to the Reply URL field.
- Click Save and close the Basic SAML Configuration window.
- Scroll down to Set up Bitrise.
- Copy the Login URL.
- Paste it to Identity provider sign-on URL field on your Bitrise Organization account.
- Scroll up a bit to SAML Signing Certificate.
Click Download next to the Certificate to download the certificate to your local computer.
Open the certificate file and copy/paste its content into the Certificate field of your Bitrise Organization.
You will need the full content of the file (starting from
----BEGIN CERTIFICATE-----all the way to
- Hit Configure SSO on Bitrise.
Enabling SAML SSO on Bitrise ⚓
Now that you have established the connection between Bitrise and Azure AD, all there is left to do is enable SAML SSO on Bitrise. If you check the People tab of your Bitrise Organization, you will see that your SAML status is disabled.
- Make sure you’re logged into Bitrise in the usual way. Use the same browser window to continue.
Bitrise sends a verification e-mail to all Organization members. This email contains a Sign In via SSO button and a URL. Organization members are prompted to sign in to Bitrise by clicking the Sign In via SSO button or using the provided URL.
The email also shows the Organization owner’s email address (should you need to contact him/her.) Click the Sign In via SSO button or copy-paste the URL to a NEW TAB of the same browser.
NOTE: Below error message only appears if you’ve been trying to access the Authorization page in a Safari browser.
Error: The CORS policy for this site does not allow access from the specified Origin....
As a workaround, we suggest you to copy the URL and paste it in a new tab. It will work! For all other browser types, you should be safely landing to the Authorization page.
On the Allow “Organization name” to sign you in window, click Authorize if you trust the Organization.
You should be landing on your Organization’s Bitrise Dashboard. You can check on the Groups tab who has been added to the org as a SAML user.
Congrats! You have successfully enabled the SAML connection! Since SAML SSO has not been enforced on your org yet, you can log in via SAML SSO or with your Bitrise credentials.
Enforcing SAML SSO on the Organization ⚓
To be able to sign into Bitrise exclusively via SAML SSO, you have to enforce SAML on the Organization. Mind you! You can only enforce SAML SSO on the org, if all Organization members have enabled their SAML SSO connection.
- Toggle the Enforce SAML SSO switch to the right on the Single Sign On tab of the org.
- Click Save Changes.
From now on, Organization members will be able to log in exclusively via SAML SSO.
Organization members can log into or sign up to Bitrise using their own SAML SSO provider's system. With SAML SSO, organizations will be able to apply the security guidelines of...
Learn how to set up Bitrise as a SAML SSO app on Google, enable SAML SSO and enforce it on your Bitrise Organization.
Learn how to set up Bitrise as a SAML SSO app on Okta, enable SAML SSO and enforce it on your Bitrise Organization.