mirror of https://github.com/zulip/zulip.git
167 lines
7.1 KiB
Markdown
167 lines
7.1 KiB
Markdown
# SAML authentication
|
|
|
|
Zulip supports using SAML authentication for single sign-on, both when
|
|
self-hosting or on the Zulip Cloud Plus plan.
|
|
|
|
This page documents details on how to set up SAML authentication with
|
|
Zulip with various common SAML identity providers. Once you have set up
|
|
SAML, you may also want to consider configuring [SCIM](/help/scim).
|
|
|
|
If you are self-hosting, this documentation is likely still useful for
|
|
how to configure these SAML providers to work with Zulip.
|
|
|
|
## Configure SAML with Okta
|
|
|
|
1. Make sure you have created your organization.
|
|
|
|
1. Set up SAML authentication by following
|
|
[Okta's documentation](https://developer.okta.com/docs/guides/saml-application-setup/overview/).
|
|
Specify:
|
|
* `https://auth.zulipchat.com/complete/saml/` for the "Single sign on URL"`.
|
|
* `https://zulipchat.com` for the "Audience URI (SP Entity ID)".
|
|
* Skip "Default RelayState".
|
|
* Skip "Name ID format".
|
|
* Set 'Email` for "Application username format".
|
|
* Provide "Attribute statements" of `email` to `user.email`,
|
|
`first_name` to `user.firstName`, and `last_name` to `user.lastName`.
|
|
|
|
1. Assign the appropriate accounts in the "Assignments" tab. These are the users
|
|
that will be able to log in to your Zulip organization.
|
|
|
|
1. Send the following information to us at support@zulip.com:
|
|
* The URL of your zulipchat-hosted organization.
|
|
* The "Identity Provider metadata" provided by Okta for the application.
|
|
* The name "X" that will be displayed on the "Log in with X" button in Zulip.
|
|
* Optionally you can also send us an icon that should be shown on the button.
|
|
|
|
1. We will take care of the server-side setup and let you know as soon as it's ready.
|
|
|
|
## Configure SAML with OneLogin
|
|
|
|
1. Make sure you have created your organization.
|
|
|
|
1. Navigate to the OneLogin Applications page, and click "Add App".
|
|
|
|
1. Search for the "SAML Custom Connector (Advanced)" app and select it.
|
|
|
|
1. Set a name and logo according to your preferences and click "Save". This doesn't affect anything in Zulip,
|
|
but will be shown on your OneLogin Applications page.
|
|
|
|
1. Go to the "Configuration" section:
|
|
* Leave the `RelayState` field empty.
|
|
* Set `https://zulipchat.com` as the Audience.
|
|
* Set `https://auth.zulipchat.com/complete/saml/` as the Recipient, ACS URL
|
|
and ACS URL Validator.
|
|
* Leave the remaining fields as they are.
|
|
|
|
1. Go to the "Parameters" section. Ignore the pre-configured parameters that are already there
|
|
and add custom ones to match the following screenshot:
|
|
|
|
![OneLogin parameters](/static/images/help/onelogin_parameters.png)
|
|
|
|
Make sure to set the "Include in SAML assertion" flag on them.
|
|
|
|
1. The OneLogin side of configuration should be ready!
|
|
Send the following information to us at support@zulip.com:
|
|
* The URL of your zulipchat-hosted organization.
|
|
* The issuer URL from the "SSO" section. It contains Identity Provider metadata that we will need.
|
|
* The name "X" that will be displayed on the "Log in with X" button in Zulip.
|
|
* Optionally you can also send us an icon that should be shown on the button.
|
|
|
|
1. We will take care of the server-side setup and let you know as soon as it's ready.
|
|
|
|
## Configure SAML with AzureAD
|
|
|
|
1. Make sure you have created your organization.
|
|
|
|
1. From your AzureAD Dashboard, navigate to "Enterprise applications",
|
|
click "New application", followed by "Create your own application".
|
|
|
|
1. Enter a name (E.g. "Zulip Cloud") for the new AzureAD application,
|
|
choose "Integrate any other application you don't find in the
|
|
gallery (Non-gallery)" and click "Create".
|
|
|
|
1. From your new AzureAD application's Overview page that opens, go to
|
|
"Single sign-on" and select "SAML".
|
|
|
|
1. In the "Basic SAML Configuration" section:
|
|
|
|
* Set "Identifier (Entity ID)" to be `https://zulipchat.com`.
|
|
* Check the "Default" box - this is necessary for IdP-initiated sign on to work.
|
|
* Set `https://auth.zulipchat.com/complete/saml/` as the "Reply URL (Assertion Consumer Service URL)".
|
|
* Optional: If you want to set up IdP-initiated sign on, enter
|
|
`{"subdomain": "{your organization's subdomain}"}` in the
|
|
`RelayState` field. E.g. if your organization's
|
|
address is `mytestorganization.zulipchat.com`, set this field to
|
|
`{"subdomain": "mytestorganization"}`.
|
|
|
|
1. The default "User Attributes & Claims" are correct. If you need to
|
|
make changes to them, mention it in your email to support@zulip.com
|
|
in a later step. The screenshot below illustrates the expected
|
|
configuration - which is the default the new app comes with at the
|
|
time of writing this:
|
|
|
|
![AzureAD attributes](/static/images/help/azuread_saml_attrs.png)
|
|
|
|
1. The AzureAD side of configuration should be ready!
|
|
Send the following information to us at support@zulip.com:
|
|
* The URL of your zulipchat-hosted organization.
|
|
* The `App Federation Metadata Url` and the certificate
|
|
downloaded from `Certificate (Base64)` in the "SAML Signing Certificate" section.
|
|
* The `Login URL` and `Azure AD Identifier` from the "Set up" section.
|
|
* The name "X" that will be displayed on the "Log in with X"
|
|
button on the Zulip login page.
|
|
* Optionally, you can also send us an icon that should be shown on the button.
|
|
|
|
1. We will take care of the server-side setup and let you know as soon as it's ready.
|
|
|
|
## Configure SAML with Keycloak
|
|
|
|
1. Make sure you have created your organization.
|
|
|
|
1. Make sure your Keycloak server is up and running. We assume the URL
|
|
is `https://keycloak.example.com` and your Keycloak realm is `yourrealm`.
|
|
|
|
1. In Keycloak, register a new Client for your Zulip organization:
|
|
* Client-ID: `https://zulipchat.com`
|
|
* Client Protocol: `saml`
|
|
* Client SAML Endpoint: leave this field empty
|
|
|
|
1. In the `Settings` tab for your new Keycloak client, set the following properties:
|
|
- Valid Redirect URIs: `https://auth.zulipchat.com/*`
|
|
- Base URL: `https://auth.zulipchat.com/complete/saml/`
|
|
- Client Signature Required: `Disable`
|
|
|
|
1. In the `Mappers` tab for your new Keycloak client:
|
|
* Create a Mapper for first name:
|
|
* Property: `firstName`
|
|
* Friendly Name: `first_name`
|
|
* SAML Attribute Name: `first_name`
|
|
* SAML Attribute Name Format: `Basic`
|
|
* Create a Mapper for last name:
|
|
* Property: `lastName`
|
|
* Friendly Name: `last_name`
|
|
* SAML Attribute Name: `last_name`
|
|
* SAML Attribute Name Format: `Basic`
|
|
* Create a Mapper for email address:
|
|
* Property: `email`
|
|
* Friendly Name: `email`
|
|
* SAML Attribute Name: `email`
|
|
* SAML Attribute Name Format: `Basic`
|
|
|
|
1. The Keycloak side of configuration should be ready! Send the
|
|
following information to Zulip Support at support@zulip.com:
|
|
|
|
* The URL of your Zulip Cloud organization, i.e. `https://example.zulipchat.com`.
|
|
* The URL of your Keycloak realm. If `master` is your Keycloak
|
|
realm name, then the Keycloak realm URL should resemble
|
|
`https://keycloak.example.com/auth/realms/yourrealm`.
|
|
|
|
|
|
## Related articles
|
|
|
|
* [SAML configuration for self-hosting][saml-readthedocs]
|
|
* [SCIM provisioning](/help/scim)
|
|
|
|
[saml-readthedocs]: https://zulip.readthedocs.io/en/stable/production/authentication-methods.html#saml
|