StatusPal
StatusPal.ioBlog
Documentation
Documentation
  • Introduction
  • Get Started
    • Key concepts
    • Step 1 - Configure services
    • Step 2 - Add your team
    • Step 3 - Personalize design
    • Step 4 - Enable notifications
    • Step 5 - Report an incident
  • Next Steps
  • FAQ
  • 1-Click Import
    • Atlassian Statuspage Importer
    • Status.io Importer (beta)
  • Platform
    • Services/components
      • Dependencies
    • Subscriptions & Notifications
      • Subscriptions
      • Notifications
      • Auto-maintenance notifications
      • Subscription Groups
      • Import email subscribers
      • Auto-subscribe to private status page
      • Custom email templates
        • Template examples
    • Incidents & Maintenance
      • Reporting an Incident
      • The Uptime Calendar Page
      • Custom Incident Types
      • Exporting your incidents
    • Information Notices
    • Private Status Page
      • Adding people to your status page
      • Access Groups/Audience Specific
    • Team Members
    • Status Page Settings & Design
      • Custom Domain
      • Advanced Settings
      • Design Customization
        • Design recipes
    • Multi-Language
    • Status Badge & Banner Widget
    • Integrations
      • Terraform
      • Datadog Metrics
      • Zoom Notifications
      • Google Analytics
      • Google Calendar
      • SendGrid Email Notifications
      • PagerDuty + Statuspal status page
      • Configure SSO for your status page with Okta
      • Configure SSO for your status page with Auth0
      • Configure your Mailgun Integration
      • Configure SMS Notifications (Twilio Integration)
      • Zabbix
      • Pingdom
      • Checkly
      • New Relic
      • Datadog
      • BetterUptime
  • Monitoring & automation
    • Out-of-the-box monitoring
    • Incident automation
    • Recurring maintenance
  • Security
    • Single Sign-On
      • Save your Recovery Codes
      • Configure Role provisioning from SAML attributes
      • Configure role provisioning for Okta
    • API Keys
Powered by GitBook
On this page
  • Enable SSO
  • Enable SSO for your status page
  1. Security

Single Sign-On

Configure SSO for your status page and your StatusPal admin console.

PreviousRecurring maintenanceNextSave your Recovery Codes

Last updated 10 months ago

Enable Single Sign-On within your StatusPal organization's Security page and let your team members sign in via your centralized, company-controlled single sign-on “SSO” provider like Okta, Azure AD, etc.

When enabling Single Sign-On in your StatusPal account, it will work with:

  1. Your team members accessing your StatusPage admin console portal.

  2. Your status page visitors when your status page is .

Enable SSO

Start by visiting your organization's settings by clicking on the back arrow next to your status page logo:

Then click on "Single Sign-On" from the sidebar, check "Enable SAML authentication" and click Save.

Your organization's Single Sign-On URL

Once you have configured SSO in your organization's Security page, make sure to save your organization's Single Sign-On URL, which you will find at the bottom of the page, below the "Require SSO" checkbox.

Share your Single Sign-On URL with your team so they can get direct access your StatusPal admin console.

Enable SSO for your status page

If you check the "Require SSO" checkbox in your organization, your status page will also work only with SSO and remove every other authentication option (email+password, Google, Github).

From this point on, you can pick one of our existing guides specific to each SSO provider in order to complete the SAML configuration: .

Once you have configured SSO for your StatusPal organization according to the previous step, any status page that you within your organization will support SSO.

https://help.statuspal.io/category/63-sso
configure as private
configured as private
Access your StatusPal organization's settings from within your status page admin dashbaord
StatusPal status pages - SSO security settings
Access your StatusPal SSO URL