StatusPal
StatusPal.ioBlog
Documentation
Documentation
  • Introduction
  • Get Started
    • Key concepts
    • Step 1 - Configure services
    • Step 2 - Add your team
    • Step 3 - Personalize design
    • Step 4 - Enable notifications
    • Step 5 - Report an incident
  • Next Steps
  • FAQ
  • 1-Click Import
    • Atlassian Statuspage Importer
    • Status.io Importer (beta)
  • Platform
    • Services/components
      • Dependencies
    • Subscriptions & Notifications
      • Subscriptions
      • Notifications
      • Auto-maintenance notifications
      • Subscription Groups
      • Import email subscribers
      • Auto-subscribe to private status page
      • Custom email templates
        • Template examples
    • Incidents & Maintenance
      • Reporting an Incident
      • The Uptime Calendar Page
      • Custom Incident Types
      • Exporting your incidents
    • Information Notices
    • Private Status Page
      • Adding people to your status page
      • Access Groups/Audience Specific
    • Team Members
    • Status Page Settings & Design
      • Custom Domain
      • Advanced Settings
      • Design Customization
        • Design recipes
    • Multi-Language
    • Status Badge & Banner Widget
    • Integrations
      • Terraform
      • Datadog Metrics
      • Zoom Notifications
      • Google Analytics
      • Google Calendar
      • SendGrid Email Notifications
      • PagerDuty + Statuspal status page
      • Configure SSO for your status page with Okta
      • Configure SSO for your status page with Auth0
      • Configure your Mailgun Integration
      • Configure SMS Notifications (Twilio Integration)
      • Zabbix
      • Pingdom
      • Checkly
      • New Relic
      • Datadog
      • BetterUptime
  • Monitoring & automation
    • Out-of-the-box monitoring
    • Incident automation
    • Recurring maintenance
  • Security
    • Single Sign-On
      • Save your Recovery Codes
      • Configure Role provisioning from SAML attributes
      • Configure role provisioning for Okta
    • API Keys
Powered by GitBook
On this page
  • Configure your IdP (SSO provider) to send the groups attribute
  • Configure your SSO Role Mappings in StatusPal
  1. Security
  2. Single Sign-On

Configure Role provisioning from SAML attributes

Automatically assign roles and status page permissions based on your Single Sign-On SAML attributes to your users accessing your status pages & StatusPal admin console.

PreviousSave your Recovery CodesNextConfigure role provisioning for Okta

Last updated 4 months ago

SSO role provisioning allows StatusPal to automatically assign roles to your users accessing your status pages and StatusPal admin console by reading a SAML property in your assertion named groups.

WARNING: Enabling SSO Role Provisioning on an active organization can be risky. If you fail to send the expected groups attribute in your SAML assertion, then the default role will be assigned, which is "viewer" member. This could cause disruption in your StatusPal organization, downgrading existing owner and admin users to viewers.

Configure your IdP (SSO provider) to send the groups attribute

The first step to enable SAML role provisioning is to configure your IdP to send the groups attribute in its SAML request to StatusPal.

As an example, this can be enabled in Azure AD by visiting the Single Sign-On page within the enterprise application that you should have configured previously for StatusPal.

Once on your Single Sign-On page, click on the Edit button under the Attributes & Claims section and click on "Add a group claim," select "All groups" (or whatever suits you), and select the "Source attribute," by default is "Group ID."

After clicking on Save, the groups attribute should be correctly sent as an array attribute with the list of group IDs the authenticated user has assigned.

Configure your SSO Role Mappings in StatusPal

Once you have made sure your SSO provider is sending the groups attribute successfully, the next step is to configure your SSO role mappings in StatusPal.

Access your SSO Role Mapping by clicking on the link at the bottom of your Security page:

Once on your SSO Role Mappings page, click on New SSO Role Mapping, and the following fields are available:

  • SAML Group Name/ID: The Group ID or name that, when found on your SAML assertion, should trigger this mapping rule.

  • Role: What role should be assigned to the StatusPal users that are part of this SSO group?

  • Status page: Should this user have access to one specific status page? Or to all status pages? If you select "All", an organization-level membership will be used If you select a status page, a status page membership will be used instead.

Make sure to create a SSO role mapping for every role in StatusPal: owner, admin, editor, viewer. Once you add at least one role mapping, any user authenticating via SSO without a matching group will be assigned the lowest StatusPal role: viewer, which can only visit and subscribe to status pages.

Once you have configured a role mapping for each StatusPal role, enable role mapping by checking the "Parse SSO roles from SAML attributes" option in the Security > Single Sign-On page.

If you're working on an active organization, we suggest you create a separate organization just for testing this feature and use something like to inspect your SAML requests and ensure that the groups attribute is being correctly sent.

If you struggle to get your roles to be properly assigned, follow to send us debugging information and send it to so we can assist you.

SAML Chrome Panel
this guide
support@statuspal.io
Example Azure AD groups claim configuration
Example of SAML Chrome Panel showing the "groups" attribute correctly included.
Status page SSO configuration for role mappings on Azure AD
Using Chrome SAML Panel to debug SSO on status page
Single Sign-On Role Mappings for status pages