SSO with SAML
Coralogix provides full SAML 2.0 support so you can integrate with your chosen IdP and manage your Coralogix users' SSO login in a centralized way. Here you can find the walkthrough process for integrating with the common IdPs in the market, don't hesitate to contact us via the chat bubble within our web app if you have any questions or comments.
Note
If you intend to follow this integration with a SCIM one, add the users through SCIM and make sure that any existing users are deleted before undertaking the SCIM integration. If necessary, you may leave one admin user.
Upon completion of the SCIM integration, recreate all users through SCIM.
Integrate with Google as a SAML IdP
View dedicated Google instructions here.
Integrate with OneLogin as a SAML IdP (EU1 regional users)
These instructions apply only to EU1 region-based users. Integration instructions for all other regions can be found in the following section.
Coralogix also supports IdP-initiated flow enabling direct connection to Coralogix from your Onelogin App portal. To enable, once our connector is saved, go to Configuration and insert your Coralogix account company ID (in your Coralogix account, go to Settings > Send your data) into the RelayState dialog box. Click Save.
Integrate with OneLogin as a SAML IdP (Non-EU1 regional users)
Click Save. The newly prepared XML configuration may be uploaded to the relevant Coralogix team.
Integrate with Okta as a SAML IdP
Note
We strongly recommend setting up your Okta SSO using SCIM rather than SAML.
In Coralogix, navigate to Settings > Configure SAML.
- Single sign-on URL > Assertion Consumer Service URL
- Audience URI (SP Entity ID) > Service Provider Entity ID/Audience
- Default RelayState >
<Company ID or Name of your Coralogix team>
- Name ID Format should be set to EmailAddress
Once complete, click Next and complete the last stage. Click Finish.
Integrate with Azure as a SAML IdP
Enter https://portal.azure.com/.
After logging into Azure, go to Azure Active Directory tab.
Select Enterprise applications service.
Choose 'New application'.
Choose 'Non-gallery application'.
Name it (for example, CoralogixSSO) and click Add.
Go to Configure single sign-on.
At the bottom of the page in step 5, click Configure CoralogixSSO.
Scroll down to step 3 of the 'Configure CoralogixSSO for SSO section, and download the file named SAML XML Metadata.
Scroll up to the top of the SSO Configuration section and click Save.
Integrate with JumpCloud as a SAML IdP
Find instructions here.
Login with SAML
After SAML has been activated for your account you may access it using SSO.
If the username you used to log in was used with Coralogix in the past (for example, the administrator wanted to block the access and removed the username), then it will be required by the administrator to approve it. In that case a request was sent to your administrator, wait for his invitation email.
Join request received by the administrator:
Finalize any additional configuration or verification needed on Coralogix’s side.
Keycloak is an open-source identity and access management solution offering single sign-on (SSO) capabilities. It allows users to authenticate across multiple applications using a single set of credentials. Integrating Keycloak with Coralogix via SAML enhances security, streamlines user authentication, and centralizes identity management. This integration enables users to securely access Coralogix with their existing Keycloak credentials, simplifying access control and enhancing the overall user experience.
Integrate Keycloak SSO with Coralogix using SAML
Follow the steps below to successfully set up the SAML integration between Keycloak and Coralogix.
Prerequisites
Configure the following entities and parameters.
Keycloak:
Operational Keycloak server
Realm ready for the integration
Users in the realm
Coralogix:
Coralogix team
Coralogix team URL
Coralogix team ID number (Settings > Send Your Data)
Service Provider Metadata URL (Settings > Configure SAML)
Assertion Consumer Service URL (Settings > Configure SAML).
Client Certificate PEM, see details below
Keycloak configuration
In the Keycloak admin console, create a new realm or use an existing one for the integration.
Export SAML 2.0 identity provider metadata.
- In the Keycloak admin console, navigate to Configure > Realm Settings.
- Click SAML 2.0 Identity Provider Metadata.
- Save the metadata as an XML file to be used for Coralogix configuration later.
Create a new client.
- Go to Clients > Clients List and click Create.
- Client type: SAML
- Client ID:
<your_CX_team_service_provider_metadata_URL>
- Name: Coralogix (or any other meaningful name)
- Description (optional)
- Configure client settings.
- Root URL:
<your_CX_team_URL>
- Home URL:
<your_CX_team_URL>
- Valid redirect URIs:
<your_assertion_URL>
- Valid post logout redirect URIs:
<your_CX_team_URL>
- IdP-initiated SSO URL name: leave empty
- IDP Initiated SSO Relay State:
<your_team_ID_number><Your Team ID number>
- Master SAML Processing URL:
<Your CX Team Service Provider Metadata URL>
- Root URL:
- Adjust SAML capabilities.
- After saving your changes, go to the Settings tab.
- Under SAML capabilities, change the Name ID format to email.
- Configure signature and encryption.
- In the Signature and Encryption section, enable Sign assertions.
- Replace the default certificate.
- Go to the Keys tab.
- Verify that the Client signature required option is enabled.
- Replace the existing certificate with the PEM certificate (public key) provided by Coralogix.
- Important: This certificate contains the public key for Coralogix, used in SAML integrations to verify the identity of Coralogix and ensure secure, authenticated communication.
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
- Configure roles.
- Go to Roles and create a new default role.
- Add the necessary users/groups to this role.
- Save the client configuration.
Coralogix configuration
In Coralogix platform, navigate to Settings > Account > Configure SAML and activate SAML.
Upload the Keycloak Identity Provider Metadata XML file that was exported earlier.
Finalize any additional configuration or verification needed on Coralogix’s side.