This guide provides step-by-step instructions on setting up Bitrise as a SAML application on Idaptive.
Before you start ⚓
- As with other Org management actions, only the Org owner can set up SAML SSO to a Bitrise Org.
- You must be logged into your Admin Portal on Idaptive to set up Bitrise as a SAML SSO app and establish the connection between Bitrise and Idaptive. If you are using the User Portal, Switch to Admin Portal by clicking your avatar on Idaptive.
- Your account on Bitrise has an Org with Org Elite or Velocity plan. If it doesn’t have an Org, go ahead and create one. Setting up SAML SSO is the same for existing and brand new Orgs on Bitrise.
Navigating to the Single Sign-On page of Bitrise ⚓
If you are an Org owner on Bitrise, you will have to use the Single Sign-On tab to set up a SAML SSO connection between your Idaptive and your Bitrise Org.
- On your Bitrise Dashboard click your avatar, then click Account settings in the dropdown.
- The Overview page displays all the Org you’re a member of. Select the Org where you wish to set up the SAML SSO connection.
- On the left menu bar, click the Single Sign-On which will take you to the Enable Single Sign-On page.
- Continue with Getting configuration information from Idaptive.
Getting configuration information from Idaptive ⚓
- Log into Idaptive as an Admin.
- Go to Apps, then to Web Apps. Click the Add Web Apps button on the right.
-
On the Custom tab and select SAML, and click Add. On the Add Web App popup hit Yes. Close the window. You will be automatically directed to the Settings page.
-
Add Bitrise to the Name and Application ID fields on the Settings page and click Save.
- Click Trust on the left menu bar and select the Manual configuration under Identity Provider Configuration.
-
Click the Signing Certificate dropdown and download the certificate. Open it with a text editor so that you can copy the full content of the certificate.
- Insert it in the SAML SSO provider certificate text box on the Enable Single Sign-On page of Bitrise.
- Copy the Single Sign On URL from the Trust page of Idaptive. Insert it on the SAML SSO provider Single Sing-On URL (SSO URL) field on the Enable Single Sign-On page of Bitrise.
- While on the Single Sign-On page of Bitrise, copy the Assertion Consumer Service URL (ACS URL) URL and click Configure SSO.
-
Now let’s head back to Idaptive! Under Service Provider Configuration click Manual Configuration. Type Bitrise in the SP Entity ID / Issuer / Audience and paste the Assertion Consumer Service URL (ACS URL) from Bitrise to the Assertion Consumer Service (ACS) URL on Idaptive.
-
Scroll down to NameID Format and select emailAddress. Click Save.
-
Go to Permissions and click the Add button. In the Select User, Group, or Role popup, type the user name you want to add to the SAML app. Select it and hit Add. Save your changes. This will change the status of your Bitrise SAML app to Deployed.
- Continue with Authorizing SAML SSO.
Authorizing SAML SSO ⚓
Now that the Org owner has set up SAML SSO, everyone in the Org has to authorize SAML SSO before logging in to their Org via SAML SSO.
- Make sure you’re logged into Bitrise in the usual way. Use the same browser window to continue.
- Bitrise sends a verification e-mail to all Org members. By clicking the Log In via SAML SSO button or using the provided URL, organization members can authorize themselves for SAML SSO login. The email also shows the Org owner’s email address (in case you would need to contact them.) Click the Log In via SAML SSO button or copy-paste the URL to a NEW TAB of the same browser.
- You’re directed to Bitrise to Allow “Organization name” to sign you in page.
- Click Authorize if you trust the Organization to control your Bitrise account sign-in process.
If you’re already logged in Idaptive, you’ll be automatically taken to your Bitrise Dashboard.
If you’re not, you’ll be prompted to log into Idaptive, and then taken to your Bitrise Dashboard. -
Click Don’t Allow if the invitation email is from an untrusted source.
Note that if you are using a different non-matching email address, you will get the below error message. Make sure you log in with the right email address both on Bitrise, as well as on your SSO provider site.
- Click Authorize if you trust the Organization to control your Bitrise account sign-in process.
If all went well, you should be landing on our Bitrise Dashboard.
What’s next? ⚓
Learn how you can:
- Check out Org member’s SAML SSO statuses once the connection is up.
- Invite new members with SAML SSO.
- Enforce SAML SSO login to the Org once all Org members have authorized their SAML SSO connection to the Org.
- Log into your Org now that SAML SSO is set up.
- Disable SAML SSO on an Org.