SAML Authentication
Hosted Graphite supports Single Sign On (SSO) via SAML-enabled identity providers. This allows users to login to our service using their existing organization credentials.
Contents
A SAML integration is set up on the team’s primary Hosted Graphite account, and any subsequent user signups via SAML will be added to this account as team members.
NOTE: SAML integration is included for all plans but must be enabled upon request. Please reach out to our support channel and we will enable this for you. Once enabled, you can locate the SAML Setup page from the Access menu.
Identity providers require SAML account metadata from Hosted Graphite in order to set up a SAML integration.
Entity ID URL:
https://CLUSTER.hostedgraphite.com/metadata/YOUR-USER-ID/
Assertion Consumer URL:
https://CLUSTER.hostedgraphite.com/complete/saml/YOUR-USER-ID/
Connection Type: IdP Initiated via IdP portal or SP Initiated via
/login/saml/YOUR-USER-ID/
XML Metadata: Available by accessing the Entity ID URL above while logged in.
NameID Format: Email address.
SAML Version: 2.0
Hosted Graphite can integrate with providers that support the SAML 2.0 specification. Example steps for connecting with some supported identity providers are listed below.
Create a Hosted Graphite integration with Azure AD
Log in to the Azure AD portal, select your directory, then go to Applications and Add.
Click Add an application from the gallery then search for and select Hosted Graphite.
Open the Hosted Graphite application integration page, click Configure single sign-on, and then select Azure AD Single Sign-On.
Enter Identifier
https://CLUSTER.hostedgraphite.com/metadata/YOUR-USER-ID/
Enter the Reply URL h
ttps://CLUSTER.hostedgraphite.com/complete/saml/YOUR-USER-ID/
The final configuration screen shows the values required for the next step. Download your certificate from this page.
Adding Azure AD provider details to Hosted Graphite
Navigate to the SAML Setup page to enter details from the configuration screen of the Azure AD App.
In the Entity ID field, enter your Issuer URL.
In the SSO Login URL field, enter your SAML SSO URL.
In the Certificate text box, enter the contents of the certificate file you downloaded.
Select a default user role for new team members.
Click Save.
This information is also available in the Azure documentation.
Create a Hosted Graphite integration with Okta
Login to the Okta portal, navigate to Admin, then Applications, and click Create App Integration.
Select the SAML 2.0 option, name the app (e.g. Hosted Graphite), and upload the HG icon.
In SAML Settings, enter the SSO URL (found in the HG app SAML Setup as: Assertion Consumer Service URL) and Audience URI (found in the HG app SAML Setup as: Entity or Issuer ID).
Then set the Name ID format as: EmailAddress, Application username as: Email.
In the Attribute Settings section, set Name as: email, Name Format as: Basic, and Value as: user.email, and click Next.
Click on View SAML Setup Instructions to display the information required in the following steps.
Now you can navigate your Okta directory and assign people or groups to the HG application. Confirm any additional information for each user and click Done when finished.
Adding Okta provider details to Hosted Graphite
Navigate to the SAML Setup page within your main Hosted Graphite application.
Enter the details from Step 6 into the relevant fields, set the default user permissions, and click Save.
Your team users should now be able to access the Hosted Graphite application through their Okta instance.
This information is also available in the Okta documentation.
Create a Hosted Graphite integration with OneLogin
Login to the OneLogin portal, go to Apps and then Add Apps.
Search for Hosted Graphite and select the SAML enabled app.
Click Save to add the app to your Company Apps and display additional configuration tabs.
In the Configuration tab, enter your HG User ID. This can be found on the SAML Setup page.
Click Save.
Go to the SSO tab to view the values you’ll copy into your Hosted Graphite account.
Adding OneLogin provider details to Hosted Graphite
Go to the SAML Setup page to enter the details from the SSO section of your OneLogin App.
In the Entity ID field, enter your SAML Issuer URL.
In the SSO Login URL field, enter your SAML Endpoint HTTP URL.
In the Certificate text box, enter your X.509 Certificate.
Select a default user role for new team members.
Click Save.
Create a Hosted Graphite integration with Ping Identity
Login to the PingOne portal, go to Applications, click Add Application then Search Application Catalog.
Search for Hosted Graphite and select the SAML app and click Setup.
Download the Certificate to enter into Hosted Graphite later, and click Continue to Next Step.
Enter ACS URL
https://CLUSTER.hostedgraphite.com/complete/saml/YOUR-USER-ID/
Enter Entity ID
https://CLUSTER.hostedgraphite.com/metadata/YOUR-USER-ID/
Select Continue to Next Step twice and then Save and Publish.
Adding Ping Identity provider details to Hosted Graphite
In PingOne, go to Applications and select the app you just created.
In the Configuration section, Issuer is your Entity ID.
Your IDP ID used below is the last parameter of the Initiate Single Sign-on URL.
In
https://sso.connect.pingidentity.com/sso/idp/SSO.saml2?idpid=${idpid} replace ${idpid}
with your IDP ID. This is your SSO Login URL.Open the certificate file downloaded earlier with a text editor. This is your Certificate.
Go to the SAML Setup page and enter your Entity ID, SSO Login URL, and Certificate.
Select a default user role for new team members.
Click Save.
Create a Hosted Graphite integration with Salesforce
Login to Salesforce, go to Settings, and search for “Identity Provider”.
Set Identity Provider to enabled, and go to Connected Apps.
Create a new connected app, and enter a Name and Email.
Enter Entity ID
https://wwCLUSTERw.hostedgraphite.com/metadata/YOUR-USER-ID/
Enter ACS URL
https://CLUSTER.hostedgraphite.com/complete/saml/YOUR-USER-ID/
Set NameID format to
emailAddress
.Click Save.
Adding Salesforce provider details to Hosted Graphite
In Salesforce, go to Manage Connected Apps from Settings and open the app you just created.
Under SAML Service Provider Settings, Issuer is your Entity ID.
Under SAML Login Information, SP-Initiated Redirect Endpoint is your SSO Login URL.
Under SAML Service Provider Settings, click the name of your certificate and then Download Certificate.
Go to our SAML Setup page and enter your Entity ID, SSO Login URL, and Certificate.
Select a default user role for new team members.
Click Save.
Create a Hosted Graphite integration with Auth0
Login to Auth0, select Add New Application and Single Page Web App.
Go to Addons and select SAML2 Web App.
Enter the Application Callback URL
https://CLUSTER.hostedgraphite.com/complete/saml/YOUR-USER-ID/
Replace the Settings JSON field with the content below:
Click Save.
Adding Auth0 provider details to Hosted Graphite
Go to the Addons section of the new Auth0 App and select SAML2 Web App.
Under the Usage tab, Issuer is your Entity ID.
Identity Provider Login URL is your SSO Login URL.
Identity Provider Certificate is your Certificate.
Go to the SAML Setup page and enter your Entity ID, SSO Login URL, URL and Certificate.
Select a default user role for new team members.
Click Save.
Notes
The team’s primary Hosted Graphite account will continue to log in without SAML. This cannot currently be changed.
Existing users cannot be signed in via SAML. Please get in touch with support if you would like that changed.
New users must signup via the single-sign-on URL provided by the 3rd party provider, and not via the Hosted Graphite user interface. This is especially important for Azure SAML login.
Last updated