StatusPal
StatusPal.ioBlog
Documentation
Documentation
  • Introduction
  • Get Started
    • Key concepts
    • Step 1 - Configure services
    • Step 2 - Add your team
    • Step 3 - Personalize design
    • Step 4 - Enable notifications
    • Step 5 - Report an incident
  • Next Steps
  • FAQ
  • 1-Click Import
    • Atlassian Statuspage Importer
    • Status.io Importer (beta)
  • Platform
    • Services/components
      • Dependencies
    • Subscriptions & Notifications
      • Subscriptions
      • Notifications
      • Auto-maintenance notifications
      • Subscription Groups
      • Import email subscribers
      • Auto-subscribe to private status page
      • Custom email templates
        • Template examples
    • Incidents & Maintenance
      • Reporting an Incident
      • The Uptime Calendar Page
      • Custom Incident Types
      • Exporting your incidents
    • Information Notices
    • Private Status Page
      • Adding people to your status page
      • Access Groups/Audience Specific
    • Team Members
    • Status Page Settings & Design
      • Custom Domain
      • Advanced Settings
      • Design Customization
        • Design recipes
    • Multi-Language
    • Status Badge & Banner Widget
    • Integrations
      • Terraform
      • Datadog Metrics
      • Zoom Notifications
      • Google Analytics
      • Google Calendar
      • SendGrid Email Notifications
      • PagerDuty + Statuspal status page
      • Configure SSO for your status page with Okta
      • Configure SSO for your status page with Auth0
      • Configure your Mailgun Integration
      • Configure SMS Notifications (Twilio Integration)
      • Zabbix
      • Pingdom
      • Checkly
      • New Relic
      • Datadog
      • BetterUptime
  • Monitoring & automation
    • Out-of-the-box monitoring
    • Incident automation
    • Recurring maintenance
  • Security
    • Single Sign-On
      • Save your Recovery Codes
      • Configure Role provisioning from SAML attributes
      • Configure role provisioning for Okta
    • API Keys
Powered by GitBook
On this page
  1. Platform
  2. Integrations

Configure SSO for your status page with Okta

PreviousPagerDuty + Statuspal status pageNextConfigure SSO for your status page with Auth0

Last updated 12 months ago

In order to configure a SAML application for Statuspal in Okta head out to your Okta admin panel and follow these steps:

  1. Click on Applications then click on Create App Integration.

  2. Check SAML 2.0 and click on Next.

  3. Enter the App Name statuspal.io and click on Next.

  4. Copy the ACS URL into Single sign on URL.

  5. Copy the SP entity ID.

  6. Click on Show Advanced Settings and check the "Enable Single Logout" field (to allow application to initiate Single Logout).

  7. Copy the Single Logout URL.

  8. Download the SP certificate and upload it into the Signature certificate, then click on Upload Certificate (in Windows you might need to use Edge for this step).

  9. Scroll down and click on Next then click on Finish.

  10. On the Assignments tab, make sure to assign yourself (the email you're signed in with in Statuspal) so you can test the configuration.

  11. On the Sign On tab, Click on View Instructions and scroll down to find the IDP metadata then copy this into your organization and Save it.

  12. Click Save, then Test SAML configuration, it should success and look like this.

After successfully testing your SAML configurations you should be able to check the Require SSO field, which will cause all your team members to be required to be authenticated with SSO before accessing the organization.