5/28/2023 0 Comments Jetbrains youtrack sso![]() The email address that is associated with this user account must be verified in YouTrack. The user who is responsible for the SAML 2.0 service provider configuration. The URL that YouTrack uses to provide metadata to the external identity provider. The assertion consumer service URL used by YouTrack as a service provider. This list only displays keystores that have been imported into YouTrack. ![]() When used, all requests that are sent to the identity provider from YouTrack are signed using the corresponding SSL certificate. Selects an SSL key that can be used to verify the identity of your YouTrack installation to the authentication service. The URL that identifies YouTrack as a service provider. Use the SAML XML Metadata from your identity provider to generate the fingerprint. The SHA-256 fingerprint of the identity provider SAML certificate. The entity ID of the external identity provider. YouTrack only supports HTTP-redirect binding for sign-on. The URL that YouTrack uses to redirect to the external identity provider. The image is resized to 48 x 48 pixels automatically. Use this setting to distinguish this module from other authentication modules in the Auth Modules list.ĭisplays the image used for the button that a user clicks to log in to YouTrack with a their account in the connected authorization service. Stores the name of the authentication module. ![]() Built-in Authorization means that this module is provided by the internal Hub service and is not installed separately. The first section of the page displays settings that identify the authentication module and let you manage the connection to the SAML service.ĭisplays the type of service that is enabled for authentication in YouTrack. The SAML 2.0 authentication modules is created and enabled.Ĭonfigure the auth module by providing the names of the SAML attributes for user accounts in the Attributes section of the page. ![]() In the dialog, specify the parameters for the IdP service, then click the Create button. In YouTrack Server, open the Administration > Auth Modules page.Ĭlick the New module button, then select SAML 2.0 from the list. If the IdP service does not provide a fingerprint of their certificate, create it applying SHA256. In a service that you plan to use as a SAML identity provider for YouTrack Server, retrieve its parameters as the IdP. Requires permissions: Low-level Admin Write Add a New SAML 2.0 Authentication Module To add a SAML 2.0 Authentication module: If you set a value for this parameter in the configuration for your IdP, the redirection to the internal Hub service results in a Can't restore state error. To support this behavior, the RelayState parameter for your SAML IdP must be empty. If the user signs in by clicking the button for the IdP in the YouTrack login page, the request is initiated by YouTrack as SP. If the user signs in through an external login portal or access management provider (for example, OneLogin), the request is initiated by the IdP. The login request is based on how the user signs in to YouTrack. The SAML 2.0 authentication module supports both service-provider (SP) and identity-provider (IdP) initiation for single-sign on (SSO). ![]() To learn how to use YouTrack as a SAML IdP, see SAML 2.0. YouTrack can also be set up as a SAML IdP, however, the instructions for the identity provider setup are not described here. New users with accounts in the connected service can create their own accounts in YouTrack. Your YouTrack users have fewer accounts and passwords to remember. Your users log in to YouTrack with the credentials that are managed in a specified third-party identity provider (SAML IdP). When you enable an SAML 2.0 authentication module in YouTrack: SAML supports single sign-on (SSO) across multiple domains. A SAML 2.0 authentication module lets you configure YouTrack as a SAML Service Provider (SAML SP). ![]()
0 Comments
Leave a Reply. |